), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000010c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0c01010003", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, r0) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f00000010c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}}, 0x0) socket(0x6, 0x80805, 0x7) 17:25:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:20 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:20 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000010c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0c01010003", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, r0) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)) socket(0x6, 0x80805, 0x7) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000010c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0c01010003", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x6, 0x80805, 0x7) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000010c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0c01010003", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}}, 0x0) socket(0x6, 0x80805, 0x7) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x0, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x0, 0x0, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)) socket(0x6, 0x80805, 0x7) 17:25:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:21 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 2: socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) socket(0x6, 0x80805, 0x7) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 2: socket(0x6, 0x80805, 0x7) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 2: socket(0x0, 0x80805, 0x7) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 2: socket(0x0, 0x80805, 0x7) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 2: socket(0x0, 0x80805, 0x7) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 2: socket(0x6, 0x0, 0x7) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:23 executing program 2: socket(0x6, 0x0, 0x0) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 2: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x4, 0x1, 0x118, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0x118, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x118, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x9, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x9, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x6, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x0, 0x5, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x0, 0x0, 0x0, 0x0, 0x2}, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:24 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@generic, @jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@generic, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic, @jmp, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x0, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:26 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:26 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:27 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 5: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x0, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd={0x18, 0xa}, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: socketpair(0xa, 0x803, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:27 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:27 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) getrusage(0xfffffffffffffffe, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000280)="8215eb191ebc0d1c25e81d5643fc67d822fe1c27a68a57ecc2c3aa1b7706ab7011cd4adbe94033a31b5ea7f84b31ccd7729b94150d31c32f12d76091898279342e7f4d3f89666eaa5d7c6afc41367175d9a8b8837ac07954f380a4f4cb04d8620a525af2d67dc221be98de5218ab6ee6f8655dbcf2490d8d5187d0f20e95b0393d3ed22c7813b13ace13544d443cb1d6b3c083eca93d9ed1aa82d10df68d1ab99700fa4981cfdb82a82988c5884a6d6817411104bf8ea0da56ae850bf406dc0850c5eb00c43186b17e41379a5701eb04ba1a61d6f01b1de1d80245500f01b90313b40bb9d9cc5fa999ff910622c9a2d993f640eb576afb", &(0x7f0000000140)=@tcp6=r0, 0x4}, 0x20) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) getrusage(0xfffffffffffffffe, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000280)="8215eb191ebc0d1c25e81d5643fc67d822fe1c27a68a57ecc2c3aa1b7706ab7011cd4adbe94033a31b5ea7f84b31ccd7729b94150d31c32f12d76091898279342e7f4d3f89666eaa5d7c6afc41367175d9a8b8837ac07954f380a4f4cb04d8620a525af2d67dc221be98de5218ab6ee6f8655dbcf2490d8d5187d0f20e95b0393d3ed22c7813b13ace13544d443cb1d6b3c083eca93d9ed1aa82d10df68d1ab99700fa4981cfdb82a82988c5884a6d6817411104bf8ea0da56ae850bf406dc0850c5eb00c43186b17e41379a5701eb04ba1a61d6f01b1de1d80245500f01b90313b40bb9d9cc5fa999ff910622c9a2d993f640eb576afb", &(0x7f0000000140)=@tcp6=r0, 0x4}, 0x20) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) getrusage(0xfffffffffffffffe, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000280)="8215eb191ebc0d1c25e81d5643fc67d822fe1c27a68a57ecc2c3aa1b7706ab7011cd4adbe94033a31b5ea7f84b31ccd7729b94150d31c32f12d76091898279342e7f4d3f89666eaa5d7c6afc41367175d9a8b8837ac07954f380a4f4cb04d8620a525af2d67dc221be98de5218ab6ee6f8655dbcf2490d8d5187d0f20e95b0393d3ed22c7813b13ace13544d443cb1d6b3c083eca93d9ed1aa82d10df68d1ab99700fa4981cfdb82a82988c5884a6d6817411104bf8ea0da56ae850bf406dc0850c5eb00c43186b17e41379a5701eb04ba1a61d6f01b1de1d80245500f01b90313b40bb9d9cc5fa999ff910622c9a2d993f640eb576afb", &(0x7f0000000140)=@tcp6=r0, 0x4}, 0x20) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) getrusage(0xfffffffffffffffe, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) getrusage(0xfffffffffffffffe, &(0x7f00000001c0)) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: socket$inet6_mptcp(0xa, 0x1, 0x106) getrusage(0x0, &(0x7f0000000040)) 17:25:28 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 5: socket$inet6_mptcp(0xa, 0x1, 0x106) getrusage(0x0, &(0x7f0000000040)) 17:25:28 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:28 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: socket$inet6_mptcp(0xa, 0x1, 0x106) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000040)=@raw=[@jmp, @map_fd], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) getrusage(0x0, &(0x7f0000000040)) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) getrusage(0x0, 0x0) 17:25:29 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:29 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:29 executing program 1: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) getrusage(0x0, 0x0) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000), 0x4) getrusage(0x0, 0x0) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) getrusage(0x0, &(0x7f0000000040)) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: getrusage(0x0, &(0x7f0000000040)) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: getrusage(0x0, 0x0) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: getrusage(0x0, 0x0) 17:25:30 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x3, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:30 executing program 5: getrusage(0x0, 0x0) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x4, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: getrusage(0x0, 0x0) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x118, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(0x0, 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], 0x0, 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:31 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 17:25:32 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:32 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r1, r2/1000+60000}, {0x0, 0xea60}}) socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) 17:25:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:25:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r1, r2/1000+60000}, {0x0, 0xea60}}) socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9049}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4842}, 0x2000) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r1, r2/1000+60000}, {0x0, 0xea60}}) socketpair(0x3, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x0) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r1, r2/1000+60000}, {0x0, 0xea60}}) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000040)) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(0x0, r0) socket(0x2c, 0x800, 0x4) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) clock_gettime(0x0, &(0x7f0000000040)) 17:25:33 executing program 5: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)) socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 4: socketpair(0x0, 0x0, 0x2, &(0x7f0000000d80)) socket(0x2c, 0x800, 0x4) 17:25:33 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x0, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) 17:25:33 executing program 5: socketpair(0xb, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 4: socket(0x2c, 0x800, 0x4) 17:25:33 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 0: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 1: clock_gettime(0x0, 0x0) 17:25:34 executing program 4: socket(0x0, 0x800, 0x4) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], 0x0, 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 1: clock_gettime(0x0, 0x0) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r3, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10a0004}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="3b41be86", @ANYRES16=r2, @ANYBLOB="00012cbd7000fddbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b0004000000060016000200000005001200010000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b000800000006001600000800000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000000000006001600ff0700000500120001000000"], 0xd0}, 0x1, 0x0, 0x0, 0x8004}, 0x880) 17:25:34 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 4: socket(0x0, 0x800, 0x4) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 1: clock_gettime(0x0, 0x0) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="49d277f0ff1917e21d4adf9f5221476fbde8e1d2ebc18dbb074896e5af3f44b6ca8bd56ec822344a769abb5b48d84338d0bb26caefe5a88d2e5929422055ba20b47058cc8762125ef20d82f361d3f563784676ef077bcba2f71fa47c384aa0e6dbd19f004593a072b061af5e73efd781436d2130e5dac2ff57c19303c14160f56dfb81cea3c87fd11ec8b980daede89fd2a75fde3913eda1feb561beff570a4b9dac46a0fdc6b1ccface68bd5ac6e7a8256637b5eae74aa8a3c897e29e73e9973f2e21225c4261912b83aa84a5d02678b8e61a9fa9d47d350126d8ec82679453659cced450155c6c0d9511d3362dca9e1a4bd0b6d1dc2a533286cd63a41731f2534e228411e32dd6b339e77f73313f1fa7d8e11a1cb0a6a7a0985ce8cc90b15d9bef3799197c16", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r3, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10a0004}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="3b41be86", @ANYRES16=r2, @ANYBLOB="00012cbd7000fddbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b0004000000060016000200000005001200010000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b000800000006001600000800000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000000000006001600ff0700000500120001000000"], 0xd0}, 0x1, 0x0, 0x0, 0x8004}, 0x880) 17:25:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:34 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) r1 = syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) 17:25:34 executing program 4: socket(0x0, 0x800, 0x4) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r3, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10a0004}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="3b41be86", @ANYRES16=r2, @ANYBLOB="00012cbd7000fddbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b0004000000060016000200000005001200010000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b000800000006001600000800000500120001000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b000000000006001600ff0700000500120001000000"], 0xd0}, 0x1, 0x0, 0x0, 0x8004}, 0x880) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="49d277f0ff1917e21d4adf9f5221476fbde8e1d2ebc18dbb074896e5af3f44b6ca8bd56ec822344a769abb5b48d84338d0bb26caefe5a88d2e5929422055ba20b47058cc8762125ef20d82f361d3f563784676ef077bcba2f71fa47c384aa0e6dbd19f004593a072b061af5e73efd781436d2130e5dac2ff57c19303c14160f56dfb81cea3c87fd11ec8b980daede89fd2a75fde3913eda1feb561beff570a4b9dac46a0fdc6b1ccface68bd5ac6e7a8256637b5eae74aa8a3c897e29e73e9973f2e21225c4261912b83aa84a5d02678b8e61a9fa9d47d350126d8ec82679453659cced450155c6c0d9511d3362dca9e1a4bd0b6d1dc2a533286cd63a41731f2534e228411e32dd6b339e77f73313f1fa7d8e11a1cb0a6a7a0985ce8cc90b15d9bef3799197c16", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r2, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 4: socket(0x2c, 0x0, 0x4) 17:25:34 executing program 5: socketpair(0xb, 0x0, 0x0, 0x0) 17:25:34 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) r1 = syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) 17:25:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:25:34 executing program 5: socketpair(0xb, 0x0, 0x0, 0x0) 17:25:34 executing program 4: socket(0x2c, 0x0, 0x0) 17:25:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:34 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) r1 = syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) 17:25:34 executing program 5: socketpair(0xb, 0x0, 0x0, 0x0) 17:25:34 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r2, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) 17:25:34 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:34 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) 17:25:34 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) 17:25:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 5: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r2, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) 17:25:35 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) 17:25:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 17:25:35 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) 17:25:35 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280de28dfa4550bf}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0xb4, r2, 0x300, 0x2, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6, 0x16, 0x68}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x9}, {0x8, 0xb, 0xa51}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xd}, {0x8, 0xb, 0x5}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x2}, 0x0) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 17:25:35 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) syz_open_dev$sg(&(0x7f00000001c0), 0x7f, 0x800) 17:25:35 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) 17:25:35 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) 17:25:35 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r0, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 1: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) r1 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) 17:25:35 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) 17:25:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="003be8b6cf9bfb1dc2c2", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 1: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000240)="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", 0x127) 17:25:35 executing program 1: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:35 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 4: openat$mice(0xffffffffffffff9c, 0x0, 0x373c0) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, 0x0, 0x8000) 17:25:35 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) 17:25:35 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:35 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 1: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:35 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x20040) 17:25:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, 0x0, 0x8000) 17:25:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:36 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x5}, 0x8) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 0: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, 0x0, 0x8000) 17:25:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) 17:25:36 executing program 4: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 0: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:36 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 0: syz_open_dev$sg(0x0, 0x3, 0x20040) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:36 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x21}, 0x8000) 17:25:36 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}}, 0x8000) 17:25:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}}, 0x0) 17:25:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:36 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:36 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:36 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:37 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:37 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x0) 17:25:37 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 2: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:37 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x20040) 17:25:37 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:37 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:37 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:37 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:37 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x20040) 17:25:37 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:37 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:37 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:37 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:38 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:38 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local, 0x8}}, 0x24) 17:25:38 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:38 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 4: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) 17:25:38 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:38 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local}}, 0x24) 17:25:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:38 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:38 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:38 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) 17:25:38 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:38 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) 17:25:38 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, 0x0, 0x0) 17:25:38 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) 17:25:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, 0x0, 0x0) 17:25:38 executing program 0: socket$rxrpc(0x21, 0x2, 0x2) 17:25:38 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) 17:25:38 executing program 4: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:38 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:38 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, 0x0, 0x0) 17:25:38 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) 17:25:39 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @btf_id, @map_fd, @map_idx, @ldst], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:39 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:25:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 1: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:39 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$RTC_UIE_ON(r1, 0x7003) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 3: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) openat$mice(0xffffffffffffff9c, 0x0, 0x400000) 17:25:39 executing program 1: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$RTC_UIE_ON(r1, 0x7003) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 0: socket$rxrpc(0x21, 0x2, 0x0) 17:25:39 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 3: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 1: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) 17:25:39 executing program 0: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) ioctl$RTC_UIE_ON(r1, 0x7003) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 3: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 1: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 0: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0xfffffffffffffff4}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) fchownat(r1, &(0x7f00000017c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) 17:25:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 5: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0750a82e3f8b1fc1c3012c92dde3498fbadf2c283e11cd11ca270278a744975257d32071bf0d1d06ef7ad3abd864d6e7bb278b76adc08f0712d42fa5f369fc4c9b08b9de56549b37fff31654ce838c", @ANYRES16=r1, @ANYBLOB="010027bd7000fddbdf250b00000005002f000000000005002f0000000000080032000400000005003000010000000a000900bbbbbbbbbbbb000005002f0001000000"], 0x48}, 0x1, 0x0, 0x0, 0x21}, 0x8000) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xac, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x1) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x98, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) 17:25:39 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 1: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) 17:25:39 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) 17:25:39 executing program 4: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x400000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, r0, 0x99e, '\x00', 0x0, r0, 0x1, 0x0, 0x2}, 0x48) 17:25:39 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local, 0x8}}, 0x24) [ 979.870509][T21755] can: request_module (can-proto-0) failed. 17:25:40 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4c0, 0x1, 0x34df, 0x1000, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:40 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x24) 17:25:40 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:40 executing program 1: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) [ 980.048105][T21769] can: request_module (can-proto-0) failed. 17:25:40 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:40 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) [ 980.126571][T21778] can: request_module (can-proto-0) failed. 17:25:40 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local, 0x8}}, 0x24) 17:25:40 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 3: socketpair(0xa, 0x803, 0x3, &(0x7f00000003c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x5002) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000280), 0x9, 0x80202) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000001500)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x94, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4080}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x9, &(0x7f0000000040)=@raw=[@generic={0x2, 0x9, 0x9, 0x5, 0x2}, @jmp={0x5, 0x1, 0x3, 0x4, 0x1, 0x118, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @ldst={0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x5, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 17:25:40 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local, 0x8}}, 0x24) [ 980.315173][T21788] can: request_module (can-proto-0) failed. 17:25:40 executing program 1: socketpair(0x1d, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 5: socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:40 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local, 0x8}}, 0x24) [ 980.382628][T21798] can: request_module (can-proto-0) failed. 17:25:40 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local}}, 0x24) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x4c0, 0x1, 0x34df, 0x1000, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:40 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:40 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x1, 0x34df, 0x1000, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:40 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) [ 980.607858][T21814] can: request_module (can-proto-0) failed. 17:25:40 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:40 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x34df, 0x1000, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:40 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, 0x0, 0x0) 17:25:40 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:40 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:25:40 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1000, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:40 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:40 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x8}}, 0x24) 17:25:41 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x2, @local, 0x8}}, 0x24) 17:25:41 executing program 0: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x99e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:41 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:25:41 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local, 0x8}}, 0x24) 17:25:41 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 0: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) 17:25:41 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 17:25:41 executing program 1: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 0: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x24) 17:25:41 executing program 1: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 17:25:41 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 17:25:41 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 1: socketpair(0x1d, 0x0, 0x0, 0x0) 17:25:41 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) 17:25:41 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:41 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:41 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:42 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:42 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:42 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:42 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") getpgid(r4) 17:25:42 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:42 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:42 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:42 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:42 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) socketpair(0x5, 0x1, 0x0, &(0x7f00000003c0)) 17:25:42 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:42 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:42 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) 17:25:42 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000180)) 17:25:42 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:42 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() getpgid(0x0) 17:25:43 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) 17:25:43 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:43 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:43 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) sendmsg$802154_raw(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @long={0x3, 0x2}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)}, 0x1, 0x0, 0x0, 0x8804}, 0x48080) 17:25:43 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) 17:25:43 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpgid(0x0) 17:25:43 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r2, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:43 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x733b, 0x4) 17:25:43 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:43 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:43 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) 17:25:43 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:44 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socket$inet6_mptcp(0xa, 0x1, 0x106) 17:25:44 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpgid(0x0) 17:25:44 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) 17:25:44 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r1, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:44 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:44 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) 17:25:44 executing program 4: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) 17:25:44 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r1, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:44 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:44 executing program 4: socket(0xb45e28790da32bc4, 0xa, 0x1ff) 17:25:44 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() 17:25:44 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpgid(0x0) 17:25:44 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:44 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r1, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:44 executing program 4: socket(0x0, 0xa, 0x1ff) 17:25:45 executing program 1: r0 = socket(0xb45e28790da32bc4, 0xa, 0x1ff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r1, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:45 executing program 4: socket(0x0, 0xa, 0x1ff) 17:25:45 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) getpgid(0x0) 17:25:45 executing program 1: socket(0xb45e28790da32bc4, 0xa, 0x1ff) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:45 executing program 4: socket(0x0, 0xa, 0x1ff) 17:25:45 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:45 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:45 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) 17:25:45 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x80) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:45 executing program 4: socket(0xb45e28790da32bc4, 0x0, 0x1ff) 17:25:45 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() getpgid(0x0) 17:25:45 executing program 4: socket(0xb45e28790da32bc4, 0x0, 0x0) 17:25:45 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:46 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:46 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:46 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() 17:25:46 executing program 1: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x80) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:46 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:46 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpgid(0x0) 17:25:46 executing program 1: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x80) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:46 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:46 executing program 1: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x80) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:46 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() 17:25:46 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:46 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:46 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:46 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:46 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) getpgid(0x0) 17:25:47 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:48 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:48 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:48 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:48 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() 17:25:48 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpgid(0x0) 17:25:48 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:48 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 17:25:48 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpgid(0x0) 17:25:48 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:48 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) gettid() 17:25:48 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:48 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) 17:25:49 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:49 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) getpgid(0x0) 17:25:49 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:49 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) gettid() 17:25:49 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:49 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) 17:25:49 executing program 2: getpgid(0x0) 17:25:49 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:49 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() gettid() 17:25:50 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:50 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) 17:25:50 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:50 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:50 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:50 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) gettid() 17:25:50 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:51 executing program 0: syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:51 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:51 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) gettid() 17:25:51 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:51 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:51 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:51 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:52 executing program 0: syz_clone(0x0, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") [ 992.540408][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.546760][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 17:25:53 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:53 executing program 5: gettid() 17:25:53 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:53 executing program 0: syz_clone(0x0, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:53 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:53 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:53 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:53 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:54 executing program 0: syz_clone(0x0, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:54 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:54 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:54 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:55 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:55 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:55 executing program 0: syz_clone(0xc1023800, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:55 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:56 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:56 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:56 executing program 0: syz_clone(0xc1023800, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:56 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:57 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:57 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:57 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() getpid() getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:25:57 executing program 0: syz_clone(0xc1023800, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") 17:25:58 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:58 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:58 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:58 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:25:59 executing program 0: syz_clone(0xc1023800, 0x0, 0x0, 0x0, 0x0, 0x0) 17:26:00 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:00 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:00 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:01 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:01 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:01 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() getpid() getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:01 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:03 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:03 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:03 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:03 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:03 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:05 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:05 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:05 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:05 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() getpid() getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:05 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:05 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:06 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:06 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:06 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:08 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:09 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:09 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:09 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:09 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:09 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:11 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:11 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:11 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:11 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:11 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:12 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:14 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:15 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:15 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:15 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:15 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() pidfd_open(0x0, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:15 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:16 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:17 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:17 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:18 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:19 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:19 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:19 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:19 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:21 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:21 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:22 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:22 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:23 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:23 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:23 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:23 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:23 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:23 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:27 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:27 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1028.418419][T22425] syz-executor.4 (22425) used greatest stack depth: 19680 bytes left 17:26:29 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:29 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:29 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:30 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:30 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:31 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:32 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:32 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:32 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:32 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:33 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:34 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:35 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:26:38 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:39 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:40 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:41 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:44 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:44 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:26:47 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1053.979701][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.986044][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 [ 1069.277227][T13534] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1069.827611][T22243] syz-executor.5 (22243) used greatest stack depth: 19496 bytes left [ 1074.186232][T13534] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1079.091041][T13534] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1084.455064][T13534] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 17:27:26 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:26 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:26 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:26 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:26 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:26 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) [ 1088.104354][T13534] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1090.857568][T13534] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1090.931364][T22343] syz-executor.5 (22343) used greatest stack depth: 18848 bytes left 17:27:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:32 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:34 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:35 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1096.534721][T13534] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1097.327774][ T3695] Bluetooth: hci0: command 0x0409 tx timeout [ 1097.417696][ T3695] Bluetooth: hci2: command 0x0409 tx timeout [ 1097.427972][ T3695] Bluetooth: hci4: command 0x0409 tx timeout [ 1097.727804][T13902] Bluetooth: hci5: command 0x0409 tx timeout [ 1098.863823][T22669] chnl_net:caif_netlink_parms(): no params data found [ 1099.006978][T22668] chnl_net:caif_netlink_parms(): no params data found 17:27:39 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:27:39 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1099.467799][T13902] Bluetooth: hci0: command 0x041b tx timeout [ 1099.497821][T13902] Bluetooth: hci2: command 0x041b tx timeout [ 1099.577701][T13902] Bluetooth: hci4: command 0x041b tx timeout [ 1099.822010][T13902] Bluetooth: hci5: command 0x041b tx timeout [ 1101.258680][T22678] chnl_net:caif_netlink_parms(): no params data found [ 1101.391520][T22673] chnl_net:caif_netlink_parms(): no params data found [ 1101.498489][ T3695] Bluetooth: hci0: command 0x040f tx timeout [ 1101.567872][ T3695] Bluetooth: hci2: command 0x040f tx timeout [ 1101.657697][ T3695] Bluetooth: hci4: command 0x040f tx timeout [ 1101.897811][ T3695] Bluetooth: hci5: command 0x040f tx timeout [ 1103.621693][T13902] Bluetooth: hci0: command 0x0419 tx timeout [ 1103.662689][T13902] Bluetooth: hci2: command 0x0419 tx timeout [ 1103.737755][T13902] Bluetooth: hci4: command 0x0419 tx timeout [ 1103.977726][T13902] Bluetooth: hci5: command 0x0419 tx timeout [ 1104.841974][T13534] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1109.893454][T22669] bridge0: port 1(bridge_slave_0) entered blocking state [ 1109.917952][T22669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1109.960671][T22669] device bridge_slave_0 entered promiscuous mode [ 1111.490957][T22669] bridge0: port 2(bridge_slave_1) entered blocking state [ 1111.498615][T22669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1111.598870][T22669] device bridge_slave_1 entered promiscuous mode [ 1111.676888][T22668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1111.718351][T22668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1111.780607][T22668] device bridge_slave_0 entered promiscuous mode [ 1115.410477][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.416809][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 [ 1116.597143][T22668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.612567][T22668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.673313][T22668] device bridge_slave_1 entered promiscuous mode [ 1118.809092][T22673] bridge0: port 1(bridge_slave_0) entered blocking state [ 1118.816298][T22673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1118.892718][T22673] device bridge_slave_0 entered promiscuous mode [ 1120.492573][T22678] bridge0: port 1(bridge_slave_0) entered blocking state [ 1120.516719][T22678] bridge0: port 1(bridge_slave_0) entered disabled state [ 1120.585442][T22678] device bridge_slave_0 entered promiscuous mode [ 1122.241953][T22669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1123.431426][T22668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1123.949121][T22673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.986130][T22673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.028391][T22673] device bridge_slave_1 entered promiscuous mode [ 1124.623807][T22678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.655898][T22678] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.680378][T22678] device bridge_slave_1 entered promiscuous mode [ 1124.723085][T22669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1124.740669][T22668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1125.267150][T22673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1127.994435][T22673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1128.395206][T22678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1128.520366][T22669] team0: Port device team_slave_0 added [ 1128.688886][T22668] team0: Port device team_slave_0 added [ 1128.894532][T22678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1128.932686][T22669] team0: Port device team_slave_1 added [ 1128.966466][T22668] team0: Port device team_slave_1 added [ 1128.991436][T22673] team0: Port device team_slave_0 added [ 1131.450426][T22673] team0: Port device team_slave_1 added [ 1132.615809][T22678] team0: Port device team_slave_0 added [ 1134.088669][T13534] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1134.490576][T22669] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1134.512083][T22669] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1134.594024][T22669] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1134.629358][T22668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1134.647608][T22668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1134.707814][T22668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1135.025624][T22678] team0: Port device team_slave_1 added [ 1135.048930][T22669] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1135.055918][T22669] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1135.190143][T22669] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1135.247928][T22668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1135.255039][T22668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1135.357773][T22668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1135.379068][T22673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1135.408525][T22673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1135.507582][T22673] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1135.962127][T13534] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1136.055524][T22673] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1136.077693][T22673] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1136.157900][T22673] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1136.185808][T22678] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1136.194480][T22678] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1136.240504][T22678] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1136.429758][T13534] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1136.533851][T22678] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1136.607669][T22678] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1136.690281][T22678] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1137.016823][T22668] device hsr_slave_0 entered promiscuous mode [ 1137.072026][T22668] device hsr_slave_1 entered promiscuous mode [ 1137.220541][T22668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1137.237579][T22668] Cannot create hsr debugfs directory [ 1137.283926][T22669] device hsr_slave_0 entered promiscuous mode [ 1137.333393][T22669] device hsr_slave_1 entered promiscuous mode [ 1137.371570][T22669] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1137.408269][T22669] Cannot create hsr debugfs directory [ 1137.462125][T13534] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1137.639590][T22673] device hsr_slave_0 entered promiscuous mode [ 1137.652174][T22673] device hsr_slave_1 entered promiscuous mode [ 1137.683282][T22673] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1137.697740][T22673] Cannot create hsr debugfs directory [ 1138.136811][T22678] device hsr_slave_0 entered promiscuous mode [ 1138.169359][T22678] device hsr_slave_1 entered promiscuous mode [ 1138.203233][T22678] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1138.218115][T22678] Cannot create hsr debugfs directory [ 1143.019513][T22678] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1143.214193][T22678] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1143.435157][T22678] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1143.573613][T22678] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1143.999634][T22669] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1144.021070][T22669] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1144.113882][T22669] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1144.158616][T22669] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1144.275565][T22673] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1144.310358][T22673] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1144.403914][T22673] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1144.468468][T22673] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1144.627400][T22668] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1144.678679][T22668] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1144.736818][T13534] device hsr_slave_0 left promiscuous mode [ 1144.783053][T13534] device hsr_slave_1 left promiscuous mode [ 1144.816668][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1144.840051][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1144.861987][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1144.878632][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1144.910404][T13534] device bridge_slave_1 left promiscuous mode [ 1144.925723][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1144.963289][T13534] device bridge_slave_0 left promiscuous mode [ 1144.981619][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.067852][T13534] device hsr_slave_0 left promiscuous mode [ 1145.085312][T13534] device hsr_slave_1 left promiscuous mode [ 1145.104209][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1145.127820][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1145.145965][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1145.159414][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1145.169599][T13534] device bridge_slave_1 left promiscuous mode [ 1145.208781][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.251787][T13534] device bridge_slave_0 left promiscuous mode [ 1145.271838][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.398754][T13534] device hsr_slave_0 left promiscuous mode [ 1145.453824][T13534] device hsr_slave_1 left promiscuous mode [ 1145.468910][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1145.492896][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1145.518420][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1145.526482][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1145.554123][T13534] device bridge_slave_1 left promiscuous mode [ 1145.577881][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.586815][T13534] device bridge_slave_0 left promiscuous mode [ 1145.594478][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.641087][T13534] device veth1_macvtap left promiscuous mode [ 1145.657676][T13534] device veth0_macvtap left promiscuous mode [ 1145.663878][T13534] device veth1_vlan left promiscuous mode [ 1145.672094][T13534] device veth0_vlan left promiscuous mode [ 1145.686722][T13534] device veth1_macvtap left promiscuous mode [ 1145.705279][T13534] device veth0_macvtap left promiscuous mode [ 1145.718233][T13534] device veth1_vlan left promiscuous mode [ 1145.724137][T13534] device veth0_vlan left promiscuous mode [ 1145.771079][T13534] device veth1_macvtap left promiscuous mode [ 1145.777196][T13534] device veth0_macvtap left promiscuous mode [ 1145.791184][T13534] device veth1_vlan left promiscuous mode [ 1145.798053][T13534] device veth0_vlan left promiscuous mode [ 1147.640219][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1147.690410][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1147.762942][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1147.837948][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1148.250742][T13534] bond0 (unregistering): Released all slaves [ 1148.965407][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1149.029076][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1149.068882][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1149.147207][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1149.588366][T13534] bond0 (unregistering): Released all slaves [ 1150.253147][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1150.299847][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1150.342356][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1150.391870][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1150.739647][T13534] bond0 (unregistering): Released all slaves [ 1150.900468][T22668] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1150.977993][T22668] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1151.075368][T22669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1151.098993][T22673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1151.120352][T22678] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1151.181266][T22678] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1151.191649][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1151.201499][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1151.225033][T22669] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.251140][T22673] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.290595][T22678] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1151.321718][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1151.338463][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1151.378846][T22678] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1151.411482][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1151.430316][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1151.456710][ T3663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.463898][ T3663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1151.473862][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1151.487192][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1151.496424][ T3663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.503613][ T3663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.513291][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1151.549533][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1151.559373][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1151.579485][ T3663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.586608][ T3663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1151.671765][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1151.694989][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1151.736008][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1151.745996][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1151.775872][ T3663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.783084][ T3663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.819567][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1151.829011][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1151.893874][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1151.913639][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1151.923157][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1151.932975][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1151.944142][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1151.954190][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1151.981982][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1152.013557][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1152.050994][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1152.085843][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1152.108949][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1152.180573][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1152.203831][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1152.262187][T22668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1152.313878][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1152.327967][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1152.336637][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1152.346791][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1152.458699][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1152.467184][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1152.527299][T22673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1152.551224][T22669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1152.618023][T22678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1152.654960][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1152.664590][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1152.695717][T22668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1152.732877][ T3695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1152.751548][ T3695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1152.791829][T22678] 8021q: adding VLAN 0 to HW filter on device team0 [ 1152.849896][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1152.872551][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1152.895268][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 1152.902437][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1152.937875][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1152.948935][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1152.957438][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 1152.964597][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1153.027030][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1153.068909][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1153.077023][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1153.110894][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1153.124472][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.131653][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1153.158543][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1153.180582][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1153.222707][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1153.232148][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 1153.239387][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1153.276619][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1153.285740][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1153.314002][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1153.348599][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1153.358387][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1153.384387][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1153.402528][T22668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1153.443979][T22668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1153.524284][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1153.549684][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1153.558990][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1153.582230][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1153.597358][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1153.631967][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1153.648100][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1153.658756][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1153.668634][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1153.690101][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1153.699336][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1153.723757][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1153.753096][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1153.800728][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1153.818378][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1153.831547][T22678] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1153.853276][T22678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1153.894417][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1153.910940][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1153.933134][T22673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1153.948075][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1153.955643][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1153.990494][T22669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1154.088004][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1154.096849][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1154.179855][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1154.198818][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1154.257052][T22725] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1154.309449][T22725] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1158.116213][T22743] chnl_net:caif_netlink_parms(): no params data found [ 1158.667698][T22743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1158.674813][T22743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1158.745344][T22743] device bridge_slave_0 entered promiscuous mode [ 1158.762104][T22743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1158.770091][T22743] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.779169][T22743] device bridge_slave_1 entered promiscuous mode [ 1158.883879][T22743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1158.929912][T22743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1159.134757][T22743] team0: Port device team_slave_0 added [ 1159.249276][T22749] chnl_net:caif_netlink_parms(): no params data found [ 1159.258856][T14405] Bluetooth: hci0: command 0x0409 tx timeout [ 1159.272080][T22743] team0: Port device team_slave_1 added [ 1159.419881][T22743] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1159.426874][T22743] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.480293][T22743] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1159.580149][T22752] chnl_net:caif_netlink_parms(): no params data found [ 1159.605350][T22743] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1159.623640][T22743] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1159.673255][T22743] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1159.941714][T22743] device hsr_slave_0 entered promiscuous mode [ 1159.968134][ T3650] Bluetooth: hci2: command 0x0409 tx timeout [ 1159.984630][T22743] device hsr_slave_1 entered promiscuous mode [ 1160.068325][T22743] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1160.075947][T22743] Cannot create hsr debugfs directory [ 1160.156029][T22753] chnl_net:caif_netlink_parms(): no params data found [ 1160.232019][ T3650] Bluetooth: hci4: command 0x0409 tx timeout [ 1160.287901][T22724] Bluetooth: hci5: command 0x0409 tx timeout [ 1160.580572][T22749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.591687][T22749] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.637793][T22749] device bridge_slave_0 entered promiscuous mode [ 1160.720935][T22749] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.748641][T22749] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.756939][T22749] device bridge_slave_1 entered promiscuous mode [ 1160.994673][T22752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1161.004958][T22752] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.039952][T22752] device bridge_slave_0 entered promiscuous mode [ 1161.058346][T22753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1161.065461][T22753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.129196][T22753] device bridge_slave_0 entered promiscuous mode [ 1161.186908][T22752] bridge0: port 2(bridge_slave_1) entered blocking state [ 1161.206340][T22752] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.251362][T22752] device bridge_slave_1 entered promiscuous mode [ 1161.273054][T22753] bridge0: port 2(bridge_slave_1) entered blocking state [ 1161.287196][T22753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.319171][T22753] device bridge_slave_1 entered promiscuous mode [ 1161.328063][T14405] Bluetooth: hci0: command 0x041b tx timeout [ 1161.384332][T22749] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1161.464172][T22749] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1161.628732][T22749] team0: Port device team_slave_0 added [ 1161.640821][T22752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1161.678214][T22753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1161.714697][T22749] team0: Port device team_slave_1 added [ 1161.749980][T22752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1161.789996][T22753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1162.042987][T22749] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1162.057905][T14405] Bluetooth: hci2: command 0x041b tx timeout [ 1162.066832][T22749] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.093659][T22749] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1162.109418][T22752] team0: Port device team_slave_0 added [ 1162.161391][T22749] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1162.179154][T22749] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.232591][T22749] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1162.267024][T22752] team0: Port device team_slave_1 added [ 1162.287737][T22724] Bluetooth: hci4: command 0x041b tx timeout [ 1162.302102][T22753] team0: Port device team_slave_0 added [ 1162.368206][T22724] Bluetooth: hci5: command 0x041b tx timeout [ 1162.399733][T22753] team0: Port device team_slave_1 added [ 1162.482873][T22752] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1162.496307][T22752] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.554481][T22752] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1162.589318][T22749] device hsr_slave_0 entered promiscuous mode [ 1162.596740][T22749] device hsr_slave_1 entered promiscuous mode [ 1162.623982][T22749] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1162.646438][T22749] Cannot create hsr debugfs directory [ 1162.674727][T22752] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1162.683402][T22752] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.715667][T22752] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1162.876028][T22753] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1162.883433][T22753] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1162.918020][T22753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1163.005917][T22753] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1163.016382][T22753] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1163.119265][T22753] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1163.212558][T22752] device hsr_slave_0 entered promiscuous mode [ 1163.237113][T22752] device hsr_slave_1 entered promiscuous mode [ 1163.276239][T22752] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1163.315258][T22752] Cannot create hsr debugfs directory [ 1163.409448][T22724] Bluetooth: hci0: command 0x040f tx timeout [ 1163.490349][T22753] device hsr_slave_0 entered promiscuous mode [ 1163.497463][T22753] device hsr_slave_1 entered promiscuous mode [ 1163.533881][T22753] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1163.551465][T22753] Cannot create hsr debugfs directory [ 1164.138785][T14405] Bluetooth: hci2: command 0x040f tx timeout [ 1164.378139][ T3589] Bluetooth: hci4: command 0x040f tx timeout [ 1164.447730][ T3650] Bluetooth: hci5: command 0x040f tx timeout [ 1165.493111][ T3650] Bluetooth: hci0: command 0x0419 tx timeout [ 1166.207931][ T3650] Bluetooth: hci2: command 0x0419 tx timeout [ 1166.447826][ T7] Bluetooth: hci4: command 0x0419 tx timeout [ 1166.527758][ T7] Bluetooth: hci5: command 0x0419 tx timeout [ 1167.698007][T22743] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1167.790900][T22743] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1167.818188][T22743] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1167.863838][T22743] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1167.931995][T13534] device hsr_slave_0 left promiscuous mode [ 1167.970239][T13534] device hsr_slave_1 left promiscuous mode [ 1167.996711][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1168.021965][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1168.043624][T13534] device bridge_slave_1 left promiscuous mode [ 1168.084348][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.114117][T13534] device bridge_slave_0 left promiscuous mode [ 1168.127911][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.178655][T13534] device hsr_slave_0 left promiscuous mode [ 1168.194650][T13534] device hsr_slave_1 left promiscuous mode [ 1168.209161][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1168.244453][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1168.301953][T13534] device bridge_slave_1 left promiscuous mode [ 1168.308695][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.338769][T13534] device bridge_slave_0 left promiscuous mode [ 1168.345000][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.402919][T13534] device hsr_slave_0 left promiscuous mode [ 1168.420020][T13534] device hsr_slave_1 left promiscuous mode [ 1168.436294][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1168.448128][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1168.459298][T13534] device bridge_slave_1 left promiscuous mode [ 1168.472441][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.490820][T13534] device bridge_slave_0 left promiscuous mode [ 1168.498594][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.542418][T13534] device hsr_slave_0 left promiscuous mode [ 1168.568768][T13534] device hsr_slave_1 left promiscuous mode [ 1168.575335][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1168.588961][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1168.609062][T13534] device bridge_slave_1 left promiscuous mode [ 1168.618948][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.659030][T13534] device bridge_slave_0 left promiscuous mode [ 1168.667080][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.704375][T13534] device hsr_slave_0 left promiscuous mode [ 1168.727200][T13534] device hsr_slave_1 left promiscuous mode [ 1168.755135][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1168.793894][T13534] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1168.818037][T13534] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1168.825525][T13534] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1168.852353][T13534] device bridge_slave_1 left promiscuous mode [ 1168.867965][T13534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.888358][T13534] device bridge_slave_0 left promiscuous mode [ 1168.894603][T13534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.052736][T13534] device veth1_macvtap left promiscuous mode [ 1169.065314][T13534] device veth0_macvtap left promiscuous mode [ 1169.072357][T13534] device veth1_vlan left promiscuous mode [ 1169.086046][T13534] device veth0_vlan left promiscuous mode [ 1171.159474][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1171.264053][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1171.371712][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1171.441850][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1171.821506][T13534] bond0 (unregistering): Released all slaves [ 1172.422732][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1172.464551][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1172.542685][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1172.605004][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1172.964925][T13534] bond0 (unregistering): Released all slaves [ 1173.642458][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1173.729099][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1173.799326][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1173.904836][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1174.300623][T13534] bond0 (unregistering): Released all slaves [ 1174.761965][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1174.813017][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1174.863224][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1174.929565][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1175.384445][T13534] bond0 (unregistering): Released all slaves [ 1176.011481][T13534] team0 (unregistering): Port device team_slave_1 removed [ 1176.029943][T13534] team0 (unregistering): Port device team_slave_0 removed [ 1176.125034][T13534] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1176.207108][T13534] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1176.761483][T13534] bond0 (unregistering): Released all slaves [ 1176.859468][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.859838][T22749] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1176.865786][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 [ 1176.912448][T22749] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1176.963725][T22749] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1176.991467][T22749] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1177.051897][T22753] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1177.157673][T22753] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1177.218243][T22753] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1177.253914][T22752] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1177.328766][T22752] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1177.340162][T22752] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1177.361826][T22753] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1177.474792][T22752] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1177.605953][T22743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1177.658454][T22749] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1177.742755][T22743] 8021q: adding VLAN 0 to HW filter on device team0 [ 1177.793029][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1177.808314][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1177.816264][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1177.880989][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1177.909522][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1177.918745][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1177.927245][ T3652] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.934416][ T3652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1177.965634][T22749] 8021q: adding VLAN 0 to HW filter on device team0 [ 1178.048945][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1178.057074][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1178.073893][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1178.084686][ T3650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.091861][ T3650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.195755][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1178.220302][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1178.242008][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1178.266590][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1178.295838][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1178.305227][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1178.327402][ T3650] bridge0: port 1(bridge_slave_0) entered blocking state [ 1178.334600][ T3650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1178.362053][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1178.371320][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1178.408168][ T3650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1178.415278][ T3650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1178.462195][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1178.549768][T22753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1178.568578][T22752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1178.587718][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1178.615261][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1178.643959][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1178.661379][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1178.687223][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1178.718794][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1178.739313][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1178.768380][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1178.788490][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1178.810058][T22743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1178.858407][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1178.870683][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1178.894600][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1178.918832][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1178.928504][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1178.949045][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1178.968272][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1178.991702][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1179.033860][T22753] 8021q: adding VLAN 0 to HW filter on device team0 [ 1179.080433][T22752] 8021q: adding VLAN 0 to HW filter on device team0 [ 1179.091801][T22749] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1179.123138][T22749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1179.152404][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1179.168260][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1179.193466][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1179.244809][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1179.270178][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1179.327479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1179.337146][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1179.362469][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.369673][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1179.396978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1179.428431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1179.452516][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1179.459696][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1179.508329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1179.539917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1179.578248][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.585363][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1179.665183][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1179.693112][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1179.719115][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1179.764116][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1179.798847][ T3650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1179.805964][ T3650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1179.858087][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1179.867154][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1179.905878][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1179.939374][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1179.997383][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1180.020354][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1180.058145][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1180.074527][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1180.113200][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1180.150085][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1180.171963][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1180.219481][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1180.235422][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1180.272146][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1180.296322][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1180.332697][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1180.367249][T22749] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1180.464298][T22753] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1180.524758][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1180.541189][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1180.587996][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1180.606416][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1180.640911][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1180.675555][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1180.696682][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1180.706064][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1180.728310][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1180.770408][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1180.812438][T22743] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1180.834138][T22752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1180.963893][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1180.988891][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1181.036108][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1181.065789][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1181.129935][T22743] device veth0_vlan entered promiscuous mode [ 1181.154222][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1181.183765][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1181.222598][T22743] device veth1_vlan entered promiscuous mode [ 1181.300103][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1181.335107][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1181.423947][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1181.443529][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1181.490884][T22743] device veth0_macvtap entered promiscuous mode [ 1181.520772][T22743] device veth1_macvtap entered promiscuous mode [ 1181.630960][T22743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1181.654263][T22743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1181.702789][T22743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1181.735938][T22743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1181.781678][T22743] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1181.792482][T22752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1181.813348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1181.823800][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1181.858567][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1181.872770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1181.883159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1181.913741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1181.939130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1181.948852][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1181.969035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1181.994724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1182.034699][T22743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1182.095057][T22743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1182.117639][T22743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1182.167606][T22743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1182.202152][T22743] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1182.233128][T22743] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1182.260047][T22743] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1182.307681][T22743] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1182.317043][T22743] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1182.373438][T22749] device veth0_vlan entered promiscuous mode [ 1182.418453][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1182.428877][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1182.450185][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1182.498198][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1182.531712][T22753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1182.587245][T22749] device veth1_vlan entered promiscuous mode [ 1182.658416][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1182.671621][ T3652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1182.940283][T22749] device veth0_macvtap entered promiscuous mode [ 1182.977841][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1182.986565][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1183.018652][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1183.035722][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1183.076776][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1183.093426][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1183.102446][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1183.114230][T22749] device veth1_macvtap entered promiscuous mode [ 1183.167192][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1183.267697][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.300482][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1183.337245][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.366247][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1183.407380][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.449618][T22749] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1183.475141][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1183.488971][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1183.509182][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1183.530808][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1183.548371][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1183.563971][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1183.601868][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1183.644903][T22753] device veth0_vlan entered promiscuous mode [ 1183.669619][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1183.686688][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.756147][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1183.790054][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.821514][T22749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1183.858404][T22749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1183.894803][T22749] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1183.946070][T13314] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1183.974052][T22753] device veth1_vlan entered promiscuous mode [ 1184.001119][T13314] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1184.011155][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1184.023289][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1184.035638][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1184.057063][T22749] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.087696][T22749] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.097851][T22749] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.106582][T22749] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1184.178019][T22725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1184.186601][T22725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1184.203316][ T1127] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1184.204067][T22752] device veth0_vlan entered promiscuous mode [ 1184.227608][ T1127] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1184.332657][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1184.353506][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1184.378975][T22724] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1184.415025][T22752] device veth1_vlan entered promiscuous mode [ 1184.495322][T22753] device veth0_macvtap entered promiscuous mode [ 1184.622433][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1184.654000][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1184.700966][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 17:29:04 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:04 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1184.747606][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1184.758848][T22753] device veth1_macvtap entered promiscuous mode [ 1184.798317][T22752] device veth0_macvtap entered promiscuous mode [ 1184.857786][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1184.865924][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1184.926463][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1184.984138][T22752] device veth1_macvtap entered promiscuous mode [ 1185.008445][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1185.016717][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1185.068728][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1185.129341][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.165582][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1185.205749][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.297581][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1185.357676][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.417622][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1185.497612][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.511449][T22753] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1185.582014][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1185.599784][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1185.659540][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1185.697643][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.760306][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1185.802057][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.879810][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1185.941402][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1185.997355][T22753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1186.043202][T22753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.128252][T22753] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1186.138542][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1186.139170][ T481] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1186.172542][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.221664][ T481] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1186.267680][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1186.341412][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.401195][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1186.437900][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.464727][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1186.505224][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.531156][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1186.587617][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1186.662331][T22752] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1186.768004][T22777] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1186.776825][T22777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1186.823288][T22777] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1186.876064][T22777] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1186.901815][T22777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1186.981627][T22753] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1186.999090][T22753] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1187.038858][T22753] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1187.077571][T22753] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1187.111369][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1187.167606][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.195775][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1187.267636][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.297556][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1187.360449][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.417567][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1187.487561][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.497465][T22752] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1187.603394][T22752] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1187.683711][T22752] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1187.819367][T22776] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1187.848288][T22776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1187.860628][T22752] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1187.907565][T22752] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1187.916327][T22752] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.019132][T22752] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.125343][ T1127] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1188.186396][ T1127] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1188.267331][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1188.525941][T13314] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1188.558922][T13314] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:29:08 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1188.626368][T22776] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1188.700517][T13537] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1188.745865][T13314] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1188.772838][T13537] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1188.820181][T13314] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1188.908212][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1188.916188][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1189.006318][T13489] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1189.088555][T13489] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1189.116594][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:29:09 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:09 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:09 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:09 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 1: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:10 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:10 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:11 executing program 1: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:11 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:11 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:11 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:11 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 1: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:12 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:13 executing program 1: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:13 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:13 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:13 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:14 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:14 executing program 1: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:14 executing program 5: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:14 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:14 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:15 executing program 2: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:16 executing program 4: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:16 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:16 executing program 1: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:16 executing program 5: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:16 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:16 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:17 executing program 1: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:17 executing program 5: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:17 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:18 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:18 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:18 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:19 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:19 executing program 5: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:19 executing program 1: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:20 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:20 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:20 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:21 executing program 1: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:21 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:21 executing program 5: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:22 executing program 2: getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:22 executing program 0: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:22 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:22 executing program 1: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:23 executing program 5: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:23 executing program 4: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:24 executing program 0: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:24 executing program 2: getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:24 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:24 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:25 executing program 5: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:25 executing program 4: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:25 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:26 executing program 2: getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:26 executing program 0: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:26 executing program 5: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:26 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:26 executing program 4: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:27 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:27 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:27 executing program 0: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:27 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpid() pidfd_open(r0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:28 executing program 5: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:28 executing program 4: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:28 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:28 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:29 executing program 0: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:29 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:29 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:29 executing program 0: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:29 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:29 executing program 4: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:31 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:31 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:31 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:32 executing program 4: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:32 executing program 0: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:32 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:32 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:29:32 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:33 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:29:36 executing program 0: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:36 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:36 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:36 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:36 executing program 4: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:38 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:38 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:38 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:29:38 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:38 executing program 4: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:38 executing program 0: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:40 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:40 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:40 executing program 0: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:40 executing program 3: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:41 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:41 executing program 4: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:42 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:42 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:43 executing program 0: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:43 executing program 3: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:29:43 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:44 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:44 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:44 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:45 executing program 0: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:45 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:46 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:46 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:46 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:47 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:29:47 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1235.469800][ T1233] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1237.947309][ T1233] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1238.290864][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.299099][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 [ 1240.655896][ T1233] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1243.239835][ T1233] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1258.556174][ T1233] device hsr_slave_0 left promiscuous mode [ 1258.570237][ T1233] device hsr_slave_1 left promiscuous mode [ 1258.582620][ T1233] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1258.595378][ T1233] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1258.613428][ T1233] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1258.637719][ T1233] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1258.664286][ T1233] device bridge_slave_1 left promiscuous mode [ 1258.701559][ T1233] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.749186][ T1233] device bridge_slave_0 left promiscuous mode [ 1258.767673][ T1233] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.810136][ T1233] device veth1_macvtap left promiscuous mode [ 1258.816229][ T1233] device veth0_macvtap left promiscuous mode [ 1258.885001][ T1233] device veth1_vlan left promiscuous mode [ 1258.910000][ T1233] device veth0_vlan left promiscuous mode [ 1260.964000][ T1233] team0 (unregistering): Port device team_slave_1 removed [ 1261.215687][ T1233] team0 (unregistering): Port device team_slave_0 removed [ 1261.628703][ T1233] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1262.017867][ T1233] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1262.841553][ T1233] bond0 (unregistering): Released all slaves [ 1268.839919][T23507] chnl_net:caif_netlink_parms(): no params data found [ 1269.993551][T23507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.003604][T23507] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.049355][T23507] device bridge_slave_0 entered promiscuous mode [ 1270.059193][T23507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.092737][T23507] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.128058][T23507] device bridge_slave_1 entered promiscuous mode [ 1270.367672][ T3662] Bluetooth: hci5: command 0x0409 tx timeout [ 1270.913052][T23507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.970498][T23507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1271.417293][T23507] team0: Port device team_slave_0 added [ 1271.447188][T23507] team0: Port device team_slave_1 added [ 1272.208129][T23507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1272.215120][T23507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1272.405526][T23507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1272.447643][T13902] Bluetooth: hci5: command 0x041b tx timeout [ 1272.491422][T23507] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1272.535755][T23507] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1272.645923][T23507] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1274.045352][T23507] device hsr_slave_0 entered promiscuous mode [ 1274.368212][T23507] device hsr_slave_1 entered promiscuous mode [ 1274.537789][T13902] Bluetooth: hci5: command 0x040f tx timeout [ 1276.627510][T22776] Bluetooth: hci5: command 0x0419 tx timeout [ 1281.327568][T22725] Bluetooth: hci0: command 0x0406 tx timeout [ 1281.333844][T22725] Bluetooth: hci2: command 0x0406 tx timeout [ 1281.337740][T22776] Bluetooth: hci4: command 0x0406 tx timeout [ 1288.358877][T23507] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1288.518385][T23507] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1288.683894][T23507] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1288.870131][T23507] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1289.244898][T23507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1289.338367][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1289.346269][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1289.383441][T23507] 8021q: adding VLAN 0 to HW filter on device team0 [ 1289.428526][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1289.437288][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1289.484419][T13902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.491599][T13902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1289.587955][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1289.596242][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1289.668227][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1289.676967][T13902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.684129][T13902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1289.786019][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1289.838528][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1289.900570][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1289.922778][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1289.980228][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1289.994862][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1290.048467][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1290.057187][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1290.111814][T14405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1290.159631][T23507] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1290.199223][T23507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1290.251392][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1290.288236][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1290.838074][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1290.845611][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1290.909497][T23507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1290.991204][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1291.028310][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1291.108874][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1291.117261][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1291.200681][T23507] device veth0_vlan entered promiscuous mode [ 1291.209764][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1291.227768][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1291.244144][T23507] device veth1_vlan entered promiscuous mode [ 1291.378210][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1291.386526][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1291.433048][T23507] device veth0_macvtap entered promiscuous mode [ 1291.468073][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1291.476955][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1291.525610][T23507] device veth1_macvtap entered promiscuous mode [ 1291.588621][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1291.597084][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1291.678370][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1291.727884][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1291.783466][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1291.815789][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1291.857548][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1291.897713][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1291.934408][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1291.987715][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.007578][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1292.075542][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.139104][T23507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1292.151675][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1292.168373][T13902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1292.191592][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1292.257517][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.285139][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1292.363832][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.404528][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1292.441834][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.496909][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1292.577529][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.637521][T23507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1292.673964][T23507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.719050][T23507] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1292.733524][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1292.758526][T22778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1292.825083][T23507] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1292.859140][T23507] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1292.897756][T23507] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1292.906506][T23507] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1293.535270][T13537] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1293.598442][T13537] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1293.660233][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1293.697031][ T481] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1293.734101][ T481] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1293.858279][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:30:54 executing program 3: socketpair(0x0, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:54 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 3: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:54 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:54 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:55 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:55 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:55 executing program 3: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:55 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:55 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r0 = getpid() pidfd_open(r0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:56 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:56 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:56 executing program 3: socketpair(0x18, 0x0, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:56 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:56 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:56 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:57 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:57 executing program 3: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:57 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r0 = getpid() pidfd_open(r0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:57 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:57 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:58 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:58 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:58 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:58 executing program 3: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:30:58 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:58 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r0 = getpid() pidfd_open(r0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:59 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:59 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:59 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:59 executing program 3: socketpair(0x18, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) [ 1299.732818][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.739194][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 17:30:59 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:30:59 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:00 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:00 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:00 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:00 executing program 3: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:31:01 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:01 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:01 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:01 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:02 executing program 3: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:31:02 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:02 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:02 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:02 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:03 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:03 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:03 executing program 3: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) getpid() r3 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) 17:31:03 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:04 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:04 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:04 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:04 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:05 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:05 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c", 0x29, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:05 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:05 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:05 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:06 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:07 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:07 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:07 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:07 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() getpid() pidfd_open(0x0, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:07 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:07 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:09 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:09 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:09 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:10 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:10 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:10 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:10 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:10 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:11 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:11 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188badd", 0x51, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:12 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:12 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:12 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:13 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:13 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:13 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:13 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:13 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:13 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:14 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:14 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) 17:31:14 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:14 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:14 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:15 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb93", 0x98, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:16 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:17 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:17 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, 0x0, &(0x7f0000000500)) 17:31:17 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:17 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47", 0x7a, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:17 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb93", 0x98, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:19 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:19 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:19 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:19 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, 0x0, &(0x7f0000000500)) 17:31:21 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb93", 0x98, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:21 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x0, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:21 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) getpid() pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r2 = getpid() pidfd_open(r2, 0x0) gettid() r3 = getpid() pidfd_open(r3, 0x0) getpid() r4 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:21 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:22 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:22 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, 0x0, &(0x7f0000000500)) 17:31:23 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:23 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:23 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:24 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:25 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, 0x0, 0x0) 17:31:25 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded", 0x9d, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:25 executing program 4: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) gettid() r1 = getpid() pidfd_open(r1, 0x0) getpid() syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:25 executing program 3: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r2 = getpid() pidfd_open(r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r3 = getpid() pidfd_open(r3, 0x0) gettid() r4 = getpid() pidfd_open(r4, 0x0) getpid() r5 = syz_clone(0xc1023800, &(0x7f0000000140)="e7db86f83588489c2d783198265fc749910ef4f4f26fcae10f709fc6863c345a7f3484825442ea4eeed288f7372e4c68de3cc235c75a30a2b908dffc0b81ded7bd74c287f25eda6a9df082fd5b0aa723d6d679f756c374e781000d0849878f9b7d6dd6e5874ef8775c5758ec804c288fe457fc23548c37c50dc85e163d890c1151de39dd76af822dc23267b66d1cc8d9cfc3b4224d793dc218f141a6496f8d2c85cbc749d727841ae328df262b8eb066d8976af0e6a1871fd0e6d3a79209a96e9fd70e16e687c196e7dacd22b2abd8bfb62723", 0xd3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="cf4b38d7b4250fc49d7d0e0cd34497c579f4b59ce55bfbc4b775eaafb85da14027253035f9ea8bfa097151643a112e8aef4b041714adb05b95795ca98492b7aaf020f29f8056f35c6a5bec61d2e0af8ea23fe72f2110683e6fb0d64b5afaf1be6ac3ccad26250b50f22269f3ed74f97dc6505131f53d085e7996bc55db78c42f39983c16ec7ac8244af59f04d9fb1b40e9ab709ea45195996c59fa8a10c61c0cfa5c8ffa93384ad711ab2f508bc1b4218b53e5489710b459e38642ab088afaa1736279ab3f277a1b874eaf2e5003125a9f5cf9") syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acbbbe1", 0xa2, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 17:31:25 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:26 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded", 0x9d, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:26 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, 0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:26 executing program 5: socketpair(0x18, 0x4, 0xffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() getpid() getpid() syz_clone(0x22a08400, &(0x7f00000003c0)="1e", 0x1, 0x0, 0x0, 0x0) 17:31:26 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb93", 0x98, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:27 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded", 0x9d, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:27 executing program 5: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d", 0x8e, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:27 executing program 0: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) r1 = getpid() pidfd_open(r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpid() pidfd_open(0x0, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:28 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb9386aef9cded8a0acb", 0xa0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 17:31:28 executing program 1: socketpair(0x18, 0x4, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r1 = getpid() pidfd_open(r1, 0x0) gettid() r2 = getpid() pidfd_open(r2, 0x0) syz_clone(0x22a08400, &(0x7f00000003c0)="1e99d372c1e44be27658b4dc2d6516110e5a16574960e059b41bb0b62eeb935fdb039fd3155328b00c70e731bbc8c8f2e34f71ef9a13f4b66066b001d92a4cc5c4e7a433b5207afcc0691628110188baddc62613b197eaaed082520a1d7eba31e93771fadc4eec41712eb882db74a273027f5f294d2e95e21e47b2d8f6ceaf1877d319ab00d1a24c7d98dcd3ae4d78d6c5b54785a028eb93", 0x98, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) [ 1333.241307][T13314] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1336.264425][T13314] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1337.412139][T13314] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1338.328349][T13314] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1351.517820][T13314] device hsr_slave_0 left promiscuous mode [ 1351.562004][T13314] device hsr_slave_1 left promiscuous mode [ 1351.612753][T13314] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1351.633783][T13314] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1351.668895][T13314] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1351.677758][T13314] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1351.691588][T13314] device bridge_slave_1 left promiscuous mode [ 1351.732302][T13314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1351.758356][T13314] device bridge_slave_0 left promiscuous mode [ 1351.765036][T13314] bridge0: port 1(bridge_slave_0) entered disabled state [ 1351.831239][T13314] device veth1_macvtap left promiscuous mode [ 1351.837311][T13314] device veth0_macvtap left promiscuous mode [ 1351.863043][T13314] device veth1_vlan left promiscuous mode [ 1351.869716][T13314] device veth0_vlan left promiscuous mode [ 1354.155015][T13314] team0 (unregistering): Port device team_slave_1 removed [ 1354.629689][T13314] team0 (unregistering): Port device team_slave_0 removed [ 1354.669115][T13314] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1354.758340][T13314] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1356.430371][T13314] bond0 (unregistering): Released all slaves [ 1361.179777][ T1380] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.186125][ T1380] ieee802154 phy1 wpan1: encryption failed: -22 [ 1363.268656][T13314] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1363.431594][T13314] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1363.517145][T13314] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1363.619079][T13314] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1364.367980][ T27] INFO: task syz-executor.0:22907 blocked for more than 143 seconds. [ 1364.383620][ T27] Not tainted 5.15.98-syzkaller #0 [ 1364.415027][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1364.438027][ T27] task:syz-executor.0 state:D stack:22712 pid:22907 ppid: 22743 flags:0x00004000 [ 1364.449143][ T27] Call Trace: [ 1364.456304][ T27] [ 1364.465407][ T27] __schedule+0x132d/0x45e0 [ 1364.476789][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1364.492779][ T27] ? print_irqtrace_events+0x210/0x210 [ 1364.516686][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1364.528082][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1364.534024][ T27] ? __sched_text_start+0x8/0x8 [ 1364.566073][ T27] ? __might_sleep+0xc0/0xc0 [ 1364.580079][ T27] ? prepare_to_wait_event+0x3aa/0x3e0 [ 1364.585589][ T27] schedule+0x11b/0x1f0 [ 1364.614675][ T27] wb_wait_for_completion+0x164/0x290 [ 1364.630845][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 1364.660281][ T27] ? init_wait_entry+0xd0/0xd0 [ 1364.665789][ T27] __writeback_inodes_sb_nr+0x2ce/0x370 [ 1364.681636][ T27] ? writeback_inodes_sb_nr+0x30/0x30 [ 1364.698038][ T27] ? down_read_trylock+0x1f1/0x340 [ 1364.703193][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 1364.730947][ T27] ? ktime_get_coarse_real_ts64+0x36/0x120 [ 1364.738064][ T27] ? cpumask_next+0xc3/0xf0 [ 1364.747837][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 1364.757730][ T27] try_to_writeback_inodes_sb+0x94/0xb0 [ 1364.787830][ T27] ext4_da_write_begin+0x228/0xc40 [ 1364.795688][ T27] ? ext4_set_page_dirty+0x340/0x340 [ 1364.822677][ T27] ? current_time+0x1af/0x2f0 [ 1364.832555][ T27] ? atime_needs_update+0x7b0/0x7b0 [ 1364.859913][ T27] generic_perform_write+0x2bf/0x5b0 [ 1364.872624][ T27] ? grab_cache_page_write_begin+0x90/0x90 [ 1364.879459][ T27] ? down_write+0x10e/0x170 [ 1364.885539][ T27] ? ext4_write_checks+0x255/0x2c0 [ 1364.891848][ T27] ext4_buffered_write_iter+0x22e/0x380 [ 1364.941396][ T27] ext4_file_write_iter+0x87c/0x1990 [ 1365.007909][ T27] ? _raw_spin_unlock+0x24/0x40 [ 1365.012818][ T27] ? follow_page_pte+0xad5/0xb60 [ 1365.024557][ T27] ? follow_page_mask+0xb59/0x13f0 [ 1365.059338][ T27] ? ext4_file_read_iter+0x6c0/0x6c0 [ 1365.064694][ T27] ? rcu_read_lock_sched_held+0x89/0x130 [ 1365.137523][ T27] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1365.143560][ T27] ? check_vma_flags+0x407/0x490 [ 1365.173813][ T27] ? iov_iter_kvec+0x4a/0x170 [ 1365.237546][ T27] __kernel_write+0x5b1/0xa60 [ 1365.242304][ T27] ? vfs_read+0xe10/0xe10 [ 1365.246662][ T27] ? __lock_acquire+0x1ff0/0x1ff0 [ 1365.295943][ T27] __dump_emit+0x264/0x3a0 [ 1365.321294][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 1365.340762][ T27] ? dump_emit+0x152/0x3f0 [ 1365.345234][ T27] dump_user_range+0x91/0x320 [ 1365.394325][ T27] elf_core_dump+0x3af0/0x4310 [ 1365.416608][ T27] ? reacquire_held_locks+0x660/0x660 [ 1365.451726][ T27] ? load_elf_library+0xa40/0xa40 [ 1365.456799][ T27] ? mark_lock+0x98/0x340 [ 1365.472739][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1365.497699][ T27] ? rcu_read_lock_any_held+0xb3/0x160 [ 1365.549706][ T27] ? kmem_cache_alloc+0x136/0x2d0 [ 1365.554802][ T27] do_coredump+0x1856/0x31b0 [ 1365.589923][ T27] ? ____kasan_slab_free+0xd8/0x120 [ 1365.595162][ T27] ? slab_free_freelist_hook+0xdd/0x160 [ 1365.652740][ T27] ? nfs_ssc_unregister+0x30/0x30 [ 1365.677563][ T27] ? rcu_read_lock_sched_held+0x89/0x130 [ 1365.684092][ T27] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1365.749919][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1365.755169][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1365.774217][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1365.847487][ T27] get_signal+0xc06/0x14e0 [ 1365.852050][ T27] arch_do_signal_or_restart+0xc3/0x1890 [ 1365.877538][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0 [ 1365.883230][ T27] ? get_sigframe_size+0x10/0x10 [ 1365.946210][ T27] ? __bad_area_nosemaphore+0x402/0x590 [ 1365.952166][ T27] ? lockdep_hardirqs_off+0x70/0x100 [ 1365.989237][ T27] ? exit_to_user_mode_loop+0x39/0x130 [ 1365.995442][ T27] exit_to_user_mode_loop+0x97/0x130 [ 1366.047330][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 1366.091063][ T27] irqentry_exit_to_user_mode+0x5/0x30 [ 1366.097138][ T27] exc_page_fault+0x33d/0x7f0 [ 1366.114094][ T27] asm_exc_page_fault+0x22/0x30 [ 1366.173313][ T27] RIP: 0033:0xe1bb [ 1366.177095][ T27] RSP: 002b:0000000020000468 EFLAGS: 00010217 [ 1366.213752][ T27] RAX: 0000000000000000 RBX: 00007feaf2ec5f80 RCX: 00007feaf2da60f9 [ 1366.259266][ T27] RDX: 0000000020000480 RSI: 0000000020000460 RDI: 0000000022a08400 [ 1366.278834][ T27] RBP: 00007feaf2e01ae9 R08: 0000000020000500 R09: 0000000020000500 [ 1366.347554][ T27] R10: 00000000200004c0 R11: 0000000000000206 R12: 0000000000000000 [ 1366.355577][ T27] R13: 00007ffef2206dbf R14: 00007feaf1318300 R15: 0000000000022000 [ 1366.447787][ T27] [ 1366.451414][ T27] [ 1366.451414][ T27] Showing all locks held in the system: [ 1366.520459][ T27] 1 lock held by khungtaskd/27: [ 1366.525494][ T27] #0: ffffffff8c91c660 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1366.571277][ T27] 2 locks held by getty/3267: [ 1366.585962][ T27] #0: ffff88814abc0098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1366.610390][ T27] #1: ffffc90002bb32e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1da0 [ 1366.698527][ T27] 5 locks held by kworker/u4:6/13314: [ 1366.703956][ T27] #0: ffff888011db5138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x1230 [ 1366.768015][ T27] #1: ffffc90004e2fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7cd/0x1230 [ 1366.806184][ T27] #2: ffffffff8d9cc8d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1366.867013][ T27] #3: ffffffff8d9d8628 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_delete_nets+0xc9/0x330 [ 1366.880420][ T27] #4: ffffffff8c920ba8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x277/0x730 [ 1366.943102][ T27] 5 locks held by kworker/u4:9/13534: [ 1366.958895][ T27] #0: ffff888142dcc138 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x1230 [ 1367.020882][ T27] #1: ffffc900062bfd20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7cd/0x1230 [ 1367.063797][ T27] #2: ffff88814b2100e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 1367.119349][ T27] #3: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1367.187626][ T27] #4: ffff8880b9b39698 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1367.225817][ T27] 2 locks held by kworker/0:1/22724: [ 1367.237578][ T27] #0: ffff888011c66538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x1230 [ 1367.307208][ T27] #1: ffffc90002e1fd20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7cd/0x1230 [ 1367.357578][ T27] 3 locks held by syz-executor.5/22851: [ 1367.363164][ T27] 2 locks held by syz-executor.0/22907: [ 1367.437590][ T27] 1 lock held by syz-executor.2/22912: [ 1367.443086][ T27] 1 lock held by syz-executor.5/23099: [ 1367.487602][ T27] 1 lock held by syz-executor.0/23267: [ 1367.493094][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1367.542333][ T27] 1 lock held by syz-executor.5/23283: [ 1367.563924][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1367.642402][ T27] 1 lock held by syz-executor.5/23304: [ 1367.657528][ T27] 1 lock held by syz-executor.1/23307: [ 1367.663017][ T27] 1 lock held by syz-executor.2/23314: [ 1367.703061][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1367.753499][ T27] 1 lock held by syz-executor.0/23315: [ 1367.759928][ T27] 1 lock held by syz-executor.4/23318: [ 1367.765414][ T27] 1 lock held by syz-executor.1/23323: [ 1367.819723][ T27] 3 locks held by syz-executor.2/23326: [ 1367.825305][ T27] 1 lock held by syz-executor.0/23338: [ 1367.887491][ T27] 1 lock held by syz-executor.4/23342: [ 1367.893000][ T27] 1 lock held by syz-executor.1/23343: [ 1367.917529][ T27] 1 lock held by syz-executor.5/23345: [ 1367.923035][ T27] 2 locks held by syz-executor.2/23346: [ 1367.969215][ T27] 1 lock held by syz-executor.4/23352: [ 1367.974708][ T27] 2 locks held by syz-executor.0/23353: [ 1368.017584][ T27] 3 locks held by syz-executor.3/23718: [ 1368.023193][ T27] 3 locks held by syz-executor.1/23737: [ 1368.060584][ T27] 1 lock held by syz-executor.4/23739: [ 1368.066090][ T27] 1 lock held by syz-executor.3/23741: [ 1368.098184][ T27] 1 lock held by syz-executor.2/23745: [ 1368.103696][ T27] 2 locks held by syz-executor.0/23747: [ 1368.144663][ T27] 1 lock held by syz-executor.3/23764: [ 1368.167520][ T27] 1 lock held by syz-executor.1/23772: [ 1368.173018][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.248281][ T27] 1 lock held by syz-executor.4/23773: [ 1368.253796][ T27] 1 lock held by syz-executor.0/23775: [ 1368.307743][ T27] 3 locks held by syz-executor.3/23782: [ 1368.313333][ T27] 1 lock held by syz-executor.1/23793: [ 1368.345257][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.414003][ T27] 1 lock held by syz-executor.0/23798: [ 1368.423052][ T27] 1 lock held by syz-executor.4/23804: [ 1368.449622][ T27] 2 locks held by syz-executor.3/23808: [ 1368.455202][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.504064][ T27] #1: ffff8880b9b39698 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1368.567550][ T27] 2 locks held by syz-executor.0/23828: [ 1368.573128][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.620454][ T27] #1: ffff88814b2143f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: __jbd2_log_wait_for_space+0x213/0x760 [ 1368.677570][ T27] 2 locks held by syz-executor.1/23829: [ 1368.683158][ T27] 2 locks held by syz-executor.5/23844: [ 1368.706642][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.757543][ T27] #1: ffff88814b2143f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: __jbd2_log_wait_for_space+0x213/0x760 [ 1368.798685][ T27] 2 locks held by syz-executor.3/23847: [ 1368.804260][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1368.887470][ T27] #1: ffffffff8c9ee040 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}, at: fs_reclaim_acquire+0x87/0x120 [ 1368.927871][ T27] 2 locks held by syz-executor.4/23848: [ 1368.940087][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1369.007531][ T27] #1: ffff88814b214990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12d5/0x1590 [ 1369.017259][ T27] 1 lock held by syz-executor.2/23850: [ 1369.081852][ T27] 1 lock held by syz-executor.1/23856: [ 1369.087351][ T27] 1 lock held by syz-executor.5/23866: [ 1369.119257][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1369.165472][ T27] 1 lock held by syz-executor.2/23883: [ 1369.186686][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1369.199079][ T27] 2 locks held by syz-executor.3/23885: [ 1369.217742][ T27] 3 locks held by syz-executor.0/23888: [ 1369.236469][ T27] 1 lock held by syz-executor.4/23890: [ 1369.242397][ T27] 2 locks held by syz-executor.1/23893: [ 1369.300548][ T27] 1 lock held by syz-executor.5/23897: [ 1369.307819][ T27] 1 lock held by syz-executor.2/23905: [ 1369.313300][ T27] 1 lock held by syz-executor.3/23909: [ 1369.341752][ T27] 1 lock held by syz-executor.4/23916: [ 1369.347269][ T27] 1 lock held by syz-executor.0/23917: [ 1369.395848][ T27] 1 lock held by syz-executor.5/23924: [ 1369.445898][ T27] 1 lock held by syz-executor.2/23940: [ 1369.451766][ T27] 1 lock held by syz-executor.3/23943: [ 1369.457269][ T27] 1 lock held by syz-executor.5/23959: [ 1369.499850][ T27] 1 lock held by syz-executor.2/23978: [ 1369.505356][ T27] 1 lock held by syz-executor.5/23991: [ 1369.516403][ T27] 1 lock held by syz-executor.0/24000: [ 1369.557237][ T27] 1 lock held by syz-executor.4/24023: [ 1369.597529][ T27] 1 lock held by syz-executor.5/24026: [ 1369.603018][ T27] 1 lock held by syz-executor.2/24028: [ 1369.628339][ T27] 1 lock held by syz-executor.0/24035: [ 1369.633822][ T27] 1 lock held by syz-executor.1/24047: [ 1369.639890][ T27] 2 locks held by syz-executor.3/24052: [ 1369.645457][ T27] 1 lock held by syz-executor.5/24063: [ 1369.667530][ T27] 1 lock held by syz-executor.4/24064: [ 1369.673040][ T27] 1 lock held by syz-executor.2/24066: [ 1369.702180][ T27] 1 lock held by syz-executor.0/24074: [ 1369.712092][ T27] 1 lock held by syz-executor.3/24093: [ 1369.732184][ T27] 1 lock held by syz-executor.1/24096: [ 1369.757554][ T27] 1 lock held by syz-executor.2/24098: [ 1369.763042][ T27] 1 lock held by syz-executor.4/24116: [ 1369.815278][ T27] 1 lock held by syz-executor.0/24117: [ 1369.821256][ T27] 1 lock held by syz-executor.1/24121: [ 1369.826755][ T27] 1 lock held by syz-executor.2/24130: [ 1369.842637][ T27] 1 lock held by syz-executor.4/24150: [ 1369.879544][ T27] 1 lock held by syz-executor.1/24154: [ 1369.885695][ T27] 1 lock held by syz-executor.0/24158: [ 1369.896408][ T27] #0: ffff88814b212bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3eb0 [ 1369.930620][ T27] 1 lock held by syz-executor.0/24486: [ 1369.947609][ T27] 1 lock held by syz-executor.1/24489: [ 1369.959811][ T27] [ 1369.962267][ T27] ============================================= [ 1369.962267][ T27] [ 1370.029287][ T27] NMI backtrace for cpu 0 [ 1370.033659][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.98-syzkaller #0 [ 1370.041583][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 1370.051645][ T27] Call Trace: [ 1370.054927][ T27] [ 1370.057863][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1370.062555][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1370.068205][ T27] ? panic+0x84d/0x84d [ 1370.072295][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1370.077431][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1370.082378][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1370.087249][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1370.093426][ T27] ? _printk+0xd1/0x111 [ 1370.097596][ T27] ? panic+0x84d/0x84d [ 1370.101675][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1370.106539][ T27] ? panic+0x84d/0x84d [ 1370.110615][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1370.115652][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1370.121793][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1370.127791][ T27] watchdog+0xec6/0xf10 [ 1370.132021][ T27] kthread+0x3f6/0x4f0 [ 1370.136133][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1370.141173][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1370.145783][ T27] ret_from_fork+0x1f/0x30 [ 1370.150274][ T27] [ 1370.154155][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1370.159554][ C1] NMI backtrace for cpu 1 [ 1370.159564][ C1] CPU: 1 PID: 481 Comm: kworker/u4:3 Not tainted 5.15.98-syzkaller #0 [ 1370.159581][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 1370.159590][ C1] Workqueue: bat_events batadv_tt_purge [ 1370.159681][ C1] RIP: 0010:mark_lock+0x98/0x340 [ 1370.159700][ C1] Code: b6 04 28 84 c0 0f 85 27 02 00 00 8b 1b 81 e3 ff 1f 00 00 89 d8 c1 e8 06 48 8d 3c c5 a0 40 ac 8f be 08 00 00 00 e8 f8 70 66 00 <48> 0f a3 1d 00 28 49 0e 73 11 48 8d 04 5b 48 c1 e0 06 48 8d 98 a0 [ 1370.159712][ C1] RSP: 0018:ffffc90002c2f958 EFLAGS: 00000056 [ 1370.159724][ C1] RAX: 0000000000000001 RBX: 0000000000000796 RCX: ffffffff81631898 [ 1370.159734][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8fac4190 [ 1370.159743][ C1] RBP: 0000000000000002 R08: dffffc0000000000 R09: fffffbfff1f58833 [ 1370.159753][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880198de168 [ 1370.159781][ C1] R13: dffffc0000000000 R14: 0000000000000004 R15: ffff8880198de148 [ 1370.159792][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1370.159805][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1370.159820][ C1] CR2: 000055d1779511b0 CR3: 0000000062433000 CR4: 00000000003506e0 [ 1370.159834][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1370.159843][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1370.159852][ C1] Call Trace: [ 1370.159857][ C1] [ 1370.159863][ C1] lockdep_hardirqs_on_prepare+0x27d/0x7a0 [ 1370.159883][ C1] ? print_irqtrace_events+0x210/0x210 [ 1370.159901][ C1] ? lockdep_hardirqs_on_prepare+0x7a0/0x7a0 [ 1370.159920][ C1] ? __local_bh_enable_ip+0x102/0x1f0 [ 1370.159962][ C1] trace_hardirqs_on+0x67/0x80 [ 1370.160000][ C1] __local_bh_enable_ip+0x164/0x1f0 [ 1370.160019][ C1] ? batadv_tt_local_purge+0x2a0/0x340 [ 1370.160035][ C1] ? _local_bh_enable+0xa0/0xa0 [ 1370.160051][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 1370.160067][ C1] ? batadv_tt_local_purge+0x107/0x340 [ 1370.160085][ C1] batadv_tt_local_purge+0x2a0/0x340 [ 1370.160105][ C1] batadv_tt_purge+0x31/0xa40 [ 1370.160121][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 1370.160135][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1370.160153][ C1] process_one_work+0x8e6/0x1230 [ 1370.160174][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1370.160191][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1370.160205][ C1] ? kthread_data+0x4e/0xc0 [ 1370.160223][ C1] ? wq_worker_running+0x97/0x170 [ 1370.160238][ C1] worker_thread+0xaca/0x1280 [ 1370.160262][ C1] kthread+0x3f6/0x4f0 [ 1370.160275][ C1] ? rcu_lock_release+0x20/0x20 [ 1370.160290][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1370.160304][ C1] ret_from_fork+0x1f/0x30 [ 1370.160326][ C1] [ 1370.588622][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1370.588640][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.98-syzkaller #0 [ 1370.588663][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 1370.588676][ T27] Call Trace: [ 1370.588683][ T27] [ 1370.588692][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1370.588732][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1370.588757][ T27] ? panic+0x84d/0x84d [ 1370.588790][ T27] panic+0x318/0x84d [ 1370.588809][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1370.588854][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1370.588881][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1370.588905][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1370.588933][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1370.588956][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1370.588983][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1370.589024][ T27] watchdog+0xf04/0xf10 [ 1370.589058][ T27] kthread+0x3f6/0x4f0 [ 1370.589078][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1370.589098][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1370.589121][ T27] ret_from_fork+0x1f/0x30 [ 1370.589159][ T27] [ 1370.589578][ T27] Kernel Offset: disabled [ 1370.828087][ T27] Rebooting in 86400 seconds..