64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:29 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:29 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:29 executing program 2: r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, r0], 0x5}, 0x58) 00:50:29 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0], 0x3}, 0x58) 00:50:29 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x0, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:29 executing program 1: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:29 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:29 executing program 1: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:29 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0], 0x2}, 0x58) 00:50:29 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:29 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:40 executing program 1: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:40 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:40 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0], 0x1}, 0x58) 00:50:40 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:40 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:40 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:40 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:40 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:40 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:49 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:49 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x58) 00:50:49 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:49 executing program 0: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:50:50 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, 0x0}, 0x58) 00:50:50 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:50:50 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:50 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, 0x0}, 0x58) 00:50:59 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, 0x0}, 0x58) 00:50:59 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) 00:50:59 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:59 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:59 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:59 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:50:59 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:59 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:50:59 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:00 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:00 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:51:00 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:00 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:00 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:00 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:00 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) 00:51:00 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:10 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:51:10 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:10 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:10 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:10 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:10 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) 00:51:10 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:10 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:10 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:11 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:51:11 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:11 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0, 0x0], 0x3}, 0x58) 00:51:11 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:11 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:11 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:20 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, 0x0], 0x2}, 0x58) 00:51:20 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:20 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:20 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:51:20 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:20 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:20 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:20 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:20 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:51:20 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:21 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:21 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:21 executing program 1: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:51:21 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0], 0x1}, 0x58) 00:51:21 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:21 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:21 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:21 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:21 executing program 1: getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:51:31 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:31 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:31 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:31 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:51:31 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:31 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:31 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:51:31 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:31 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:51:31 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:31 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:41 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:41 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:41 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:41 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:41 executing program 6: clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)}, 0x58) 00:51:41 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:41 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:41 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:42 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) 00:51:42 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:42 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:42 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0, 0x0], 0x3}, 0x58) 00:51:42 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:42 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:42 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 3: clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), 0x0, 0x0, {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, 0x0], 0x2}, 0x58) 00:51:51 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:51 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:51 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:51:51 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:51:51 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:01 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 0: getpgrp(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:01 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:01 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) 00:52:01 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:11 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:11 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:11 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:11 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:11 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:11 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:11 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:11 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:12 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:12 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:12 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) 00:52:12 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x0, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:52:12 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:23 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) 00:52:23 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:23 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:23 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x0, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) 00:52:23 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) 00:52:23 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) 00:52:23 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:23 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:23 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(0x0, 0x7fff, 0x11d000) 00:52:23 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) 00:52:23 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x0, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:23 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x0, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:38 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:38 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:38 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) 00:52:38 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:38 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:38 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:39 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:48 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:48 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:48 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:48 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:48 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:52:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:48 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:48 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x0, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x0) 00:52:48 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:52:48 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:59 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:52:59 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x0, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x0) 00:52:59 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:59 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:59 executing program 6: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:52:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x0) 00:52:59 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:59 executing program 3: getpgrp(0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:59 executing program 6: getpgrp(0x0) getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:52:59 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:52:59 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:59 executing program 3: syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x11d000) 00:52:59 executing program 6: getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:52:59 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:52:59 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:52:59 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:52:59 executing program 3: syz_open_dev$mouse(0x0, 0x0, 0x11d000) 00:52:59 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:10 executing program 3: syz_open_dev$mouse(0x0, 0x0, 0x11d000) 00:53:10 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:10 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:53:10 executing program 1: getpgrp(0x0) getpgrp(0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:53:10 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:53:10 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:10 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:10 executing program 6: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:53:11 executing program 1: getpgrp(0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:53:11 executing program 6: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:53:11 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:53:11 executing program 3: syz_open_dev$mouse(0x0, 0x0, 0x11d000) 00:53:11 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:21 executing program 1: openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:53:21 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:21 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:21 executing program 6: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:53:21 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:21 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(0x0, 0x0) 00:53:21 executing program 3: syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) 00:53:21 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:21 executing program 1: openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:53:21 executing program 6: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:53:21 executing program 3: syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) 00:53:21 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) 00:53:21 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x0, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 3: syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) 00:53:33 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) 00:53:33 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 6: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:53:33 executing program 1: openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:53:33 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) 00:53:33 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 1: openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:53:33 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 1: openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:53:33 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x0, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:33 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 00:53:33 executing program 1: openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:53:43 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x0, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x0, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:53:43 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) 00:53:43 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:43 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:53:52 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x0, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) 00:53:52 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x0, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:53:52 executing program 0: getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:53:52 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x0, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x0, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x0, 0x81, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:52 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:53:53 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:53 executing program 0: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:53:53 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:53 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x0, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:53 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x0, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:53 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) 00:53:53 executing program 0: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:53:53 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:53:53 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x0, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 0: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:54:02 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x0, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) 00:54:02 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x0, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:54:02 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:02 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 0: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:54:11 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:11 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x0, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) 00:54:11 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000b40), 0x2, 0x0) 00:54:11 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:11 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) 00:54:11 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:11 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:11 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x0, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:11 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) 00:54:12 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, 0x0, {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:12 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:12 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:12 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:12 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:21 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:21 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:21 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:21 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:21 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:21 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:21 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:21 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x0, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:22 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:22 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:22 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) 00:54:22 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:30 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x0, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:30 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) 00:54:30 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:30 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:30 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) 00:54:30 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:30 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:30 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:30 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) 00:54:30 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:30 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, 0x0, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x0, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:30 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:41 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00'}) 00:54:41 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 0: getpgrp(0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:41 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, 0x0, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, 0x0, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:41 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0xffffffff) 00:54:41 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 0: openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) 00:54:41 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, 0x0, 0x0, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:41 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 0: openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) 00:54:41 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) 00:54:41 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:41 executing program 0: openat$binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) 00:54:51 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:51 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:51 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:51 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:51 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:54:51 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:51 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:54:51 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x0, 0x0) 00:54:51 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:54:51 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400), 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 00:54:51 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:01 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:01 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:01 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:01 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:01 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:01 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:01 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:01 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:10 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:55:10 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 3: r0 = getpgrp(0x0) getpgrp(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:10 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 6: r0 = getpgrp(0x0) getpgrp(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:55:10 executing program 3: getpgrp(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:10 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 6: getpgrp(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:20 executing program 1: getpgrp(0x0) r0 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r0}) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:20 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:20 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:20 executing program 6: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:20 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, 0x0}, 0x58) 00:55:20 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:20 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:20 executing program 1: getpgrp(0x0) getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:20 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:21 executing program 6: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:21 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:30 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:30 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:30 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, r0, r0, r0], 0x4}, 0x58) 00:55:30 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x0, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:30 executing program 1: getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:30 executing program 6: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:30 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:30 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:30 executing program 6: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 00:55:30 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:30 executing program 1: getpgrp(0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:30 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) [ 907.401141] kmemleak: Found object by alias at 0x607f1a639284 [ 907.401163] CPU: 1 UID: 0 PID: 7197 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 907.401186] Tainted: [W]=WARN [ 907.401190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 907.401198] Call Trace: [ 907.401202] [ 907.401207] dump_stack_lvl+0xca/0x120 [ 907.401238] __lookup_object+0x94/0xb0 [ 907.401257] delete_object_full+0x27/0x70 [ 907.401275] free_percpu+0x30/0x1160 [ 907.401292] ? arch_uprobe_clear_state+0x16/0x140 [ 907.401314] futex_hash_free+0x38/0xc0 [ 907.401330] mmput+0x2d3/0x390 [ 907.401350] copy_process+0x273d/0x73c0 [ 907.401362] ? lock_release+0xc8/0x290 [ 907.401384] ? __pfx_copy_process+0x10/0x10 [ 907.401397] ? __might_fault+0xe0/0x190 [ 907.401416] ? _copy_from_user+0x5b/0xd0 [ 907.401435] kernel_clone+0xea/0x7f0 [ 907.401449] ? __pfx_kernel_clone+0x10/0x10 [ 907.401467] ? __pfx_futex_wake+0x10/0x10 [ 907.401487] __do_sys_clone3+0x1f5/0x280 [ 907.401499] ? __pfx___do_sys_clone3+0x10/0x10 [ 907.401520] ? find_held_lock+0x2b/0x80 [ 907.401543] ? __fget_files+0x20d/0x3b0 [ 907.401556] ? __pfx___x64_sys_futex+0x10/0x10 [ 907.401571] ? xfd_validate_state+0x55/0x180 [ 907.401596] do_syscall_64+0xbf/0x360 [ 907.401608] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 907.401622] RIP: 0033:0x7fec978d2b19 [ 907.401632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 907.401645] RSP: 002b:00007fec94e48188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 907.401657] RAX: ffffffffffffffda RBX: 00007fec979e5f60 RCX: 00007fec978d2b19 [ 907.401666] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000ec0 [ 907.401673] RBP: 00007fec9792cf6d R08: 0000000000000000 R09: 0000000000000000 [ 907.401681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 907.401688] R13: 00007fff75be0daf R14: 00007fec94e48300 R15: 0000000000022000 [ 907.401705] [ 907.401709] kmemleak: Object (percpu) 0x607f1a639280 (size 8): [ 907.401716] kmemleak: comm "systemd", pid 1, jiffies 4295574203 [ 907.401723] kmemleak: min_count = 1 [ 907.401727] kmemleak: count = 0 [ 907.401731] kmemleak: flags = 0x21 [ 907.401735] kmemleak: checksum = 0 [ 907.401739] kmemleak: backtrace: [ 907.401743] pcpu_alloc_noprof+0x87a/0x1170 [ 907.401759] percpu_ref_init+0x37/0x400 [ 907.401777] mem_cgroup_css_online+0x7f/0x730 [ 907.401792] online_css+0xb1/0x330 [ 907.401804] cgroup_apply_control_enable+0x5e8/0x9f0 [ 907.401818] cgroup_mkdir+0x86e/0x1110 [ 907.401831] kernfs_iop_mkdir+0x111/0x190 [ 907.401847] vfs_mkdir+0x59a/0x8d0 [ 907.401864] do_mkdirat+0x19f/0x3d0 [ 907.401876] __x64_sys_mkdir+0xf3/0x140 [ 907.401887] do_syscall_64+0xbf/0x360 [ 907.401896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 908.028836] ------------[ cut here ]------------ [ 908.029775] percpu ref (css_release) <= 0 (-2452) after switching to atomic [ 908.030181] WARNING: lib/percpu-refcount.c:197 at percpu_ref_switch_to_atomic_rcu+0x3cc/0x480, CPU#0: systemd/1 [ 908.032770] Modules linked in: [ 908.033301] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 908.034911] Tainted: [W]=WARN [ 908.035366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 908.036589] RIP: 0010:percpu_ref_switch_to_atomic_rcu+0x3cc/0x480 [ 908.039822] Code: 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 9e 00 00 00 49 8b 75 e8 48 c7 c7 80 97 e2 84 e8 75 c5 e9 fe 90 <0f> 0b 90 90 e9 2b ff ff ff e8 f6 de 5f ff e9 9e fe ff ff e8 7c df [ 908.045789] RSP: 0018:ffff88806ce08e20 EFLAGS: 00010286 [ 908.046588] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8139de70 [ 908.047692] RDX: ffff8880094f8000 RSI: ffffffff8139de7e RDI: 0000000000000001 [ 908.048773] RBP: 7ffffffffffff66b R08: 0000000000000001 R09: ffffed100d9c4801 [ 908.049855] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800a225200 [ 908.050936] R13: ffff88800a225220 R14: 0000000000000002 R15: 0000000000000003 [ 908.052033] FS: 00007fc0c65fe900(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 908.053241] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 908.054152] CR2: 000056522cb197b8 CR3: 000000000707c000 CR4: 0000000000350ef0 [ 908.055249] Call Trace: [ 908.055652] [ 908.056019] ? rcu_core+0x7c3/0x1800 [ 908.056593] rcu_core+0x7c8/0x1800 [ 908.057177] ? __pfx_rcu_core+0x10/0x10 [ 908.057808] ? lock_release+0xc8/0x290 [ 908.058410] handle_softirqs+0x1b1/0x770 [ 908.059071] __irq_exit_rcu+0xc4/0x100 [ 908.059702] irq_exit_rcu+0x9/0x20 [ 908.060241] sysvec_apic_timer_interrupt+0x70/0x80 [ 908.061011] [ 908.061358] [ 908.061728] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 908.062514] RIP: 0010:stack_depot_save_flags+0xc8/0xa20 [ 908.063327] Code: 89 c8 29 cb 01 c1 41 c1 c0 08 44 31 c3 41 89 d8 29 d8 01 cb 41 c1 c0 10 44 31 c0 29 c1 41 89 c8 89 c1 01 d8 c1 c9 0d 44 31 c1 <29> cb 41 89 d8 89 cb 01 c1 c1 c3 04 44 31 c3 83 ff 03 77 95 83 ff [ 908.066043] RSP: 0018:ffff888009547bc0 EFLAGS: 00000202 [ 908.066858] RAX: 00000000d7e98218 RBX: 000000009e914fe0 RCX: 0000000075799132 [ 908.067944] RDX: 0000000000000007 RSI: ffff888009547c40 RDI: 0000000000000008 [ 908.069025] RBP: 0000000000000001 R08: 00000000e4b85bf3 R09: 0000000000000000 [ 908.070106] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 [ 908.071187] R13: 0000000000002800 R14: ffff888009547c28 R15: 0000000000000007 [ 908.072301] set_track_prepare+0x44/0x70 [ 908.072949] ? __kmalloc_cache_noprof+0x42a/0x690 [ 908.073714] ? kmem_cache_free+0x134/0x540 [ 908.074351] ? __fput+0x67b/0xb50 [ 908.074911] ? fput_close_sync+0x10f/0x240 [ 908.075557] ? __x64_sys_close+0x8f/0x120 [ 908.076214] ? do_syscall_64+0xbf/0x360 [ 908.076841] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 908.077628] ? lockdep_init_map_type+0x4b/0x240 [ 908.078359] __alloc_object+0xf0/0x2c0 [ 908.078988] __create_object+0x1d/0x80 [ 908.079597] __kmalloc_cache_noprof+0x42a/0x690 [ 908.080336] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 908.081144] ? __call_rcu_common.constprop.0+0x4c1/0x960 [ 908.081981] ? kmem_cache_free+0x134/0x540 [ 908.082612] kmem_cache_free+0x134/0x540 [ 908.083247] ? __fput+0x67b/0xb50 [ 908.083826] __fput+0x67b/0xb50 [ 908.084353] fput_close_sync+0x10f/0x240 [ 908.084999] ? __pfx_fput_close_sync+0x10/0x10 [ 908.085733] ? dnotify_flush+0x79/0x4c0 [ 908.086345] __x64_sys_close+0x8f/0x120 [ 908.086992] do_syscall_64+0xbf/0x360 [ 908.087577] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 908.088370] RIP: 0033:0x7fc0c6dcc6eb [ 908.088958] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 a3 56 f9 ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 e1 56 f9 ff 8b 44 [ 908.091693] RSP: 002b:00007ffd26f20d30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 908.092859] RAX: ffffffffffffffda RBX: 00007fc0c65fe6c8 RCX: 00007fc0c6dcc6eb [ 908.093939] RDX: 000000000000000f RSI: 0000000000000007 RDI: 000000000000000d [ 908.095024] RBP: 000000000000000d R08: 0000000000000000 R09: 000056522cb19a30 [ 908.096118] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 908.097207] R13: 00007ffd26f20df0 R14: 0000000000000001 R15: 0000000000000001 [ 908.098311] [ 908.098730] irq event stamp: 5936644 [ 908.099282] hardirqs last enabled at (5936652): [] __up_console_sem+0x78/0x80 [ 908.100630] hardirqs last disabled at (5936661): [] __up_console_sem+0x5d/0x80 [ 908.101972] softirqs last enabled at (5935672): [] handle_softirqs+0x50c/0x770 [ 908.103323] softirqs last disabled at (5935893): [] __irq_exit_rcu+0xc4/0x100 [ 908.104662] ---[ end trace 0000000000000000 ]--- [ 908.105396] percpu_ref_switch_to_atomic_rcu: percpu_ref_switch_to_atomic_rcu(): percpu_ref underflow slab kmalloc-64 start ffff88800a225200 pointer offset 0 size 64 [ 908.120624] percpu_ref_switch_to_atomic_rcu: percpu_ref_switch_to_atomic_rcu(): percpu_ref underflow slab kmalloc-64 start ffff88800daa8000 pointer offset 0 size 64 00:55:40 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x0, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, r0, r0, r0], 0x4}, 0x58) 00:55:40 executing program 0: r0 = getpgrp(0x0) getpgrp(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:40 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x0, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) 00:55:40 executing program 6: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000b40), 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r7, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:55:40 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x20000004) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0x0, 0x0, 0x0, {0x0, 0x0, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 0: getpgrp(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:55:40 executing program 7: r0 = getpgrp(0x0) getpgrp(r0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000b80), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, 0x0) clone3(&(0x7f0000000ec0)={0x48040280, 0x0, 0x0, &(0x7f0000000c80), {}, &(0x7f0000000cc0)=""/177, 0xb1, 0x0, &(0x7f0000000e40)=[0x0, r0, r0, r0], 0x4}, 0x58) 00:55:40 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, 0x0) 00:55:40 executing program 2: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x0, 0x8}}) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) 00:55:40 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(r0) ioctl$BINDER_GET_FROZEN_INFO(0xffffffffffffffff, 0xc00c620f, &(0x7f0000000000)={r1}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x2, 0x9, 0x7fff, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7, 0x10, 0x81, 0x8}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000004) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x68}, @void, @val={0xc, 0x99, {0x200, 0x2f}}}}, [@NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x64}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000003c0)={0x73622a85, 0x1101, 0x2}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)={0x2c4, 0x13, 0x100, 0x70bd2c, 0x25dfdbfb, {0x18, 0xe0, 0x2, 0x5, {0x4e23, 0x4e24, [0x1, 0x667, 0x400, 0x400], [0x4, 0x0, 0x5, 0x6], 0x0, [0x9f3, 0xa8000000]}, 0x10001, 0x9e}, [@INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "3f1cbfb7b0cb835bad07c1cf83d2f67876d83e64837d41169eb61fb1b641eba00bb2e3c8cac3bffee1c2ca6ca5446160971e9e14025b353f8918d63281a6dc2fe484c88a4cbd9651f0e61e6dd1fbdf5a4c5d8b1c5bcafb9bef89c73960df9a50431194828081fa2f17026342a3cf338cbdeed598ef1f7172019d3f81b11ffce6c73acf89ec155e5d92933d65895681f305c7755b41f0fa3785e3aad2763a7c490e029360d152bc28dd8f8f92c2e554146f"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "4477fb65c438e4d9f8ea2ce7dd6b41b97e39ec9b7d90a73749e1336edf52d45ddb9c89a52d45f433d6d13deed6bca27b0f4476a701004f9b83d22819adb47dbab73b1ecda0be557ec3315f864d4d8b83"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "c32fc847e7e59bb538a7a100378d2ba2aef97060794b8bf9baa2304458fb8ba0644a1648171df95da626398972669cb9440936b8138c75aff78cda562c99e84f45f0967474889c5c05ae3ecd3447c882337836affe665133d9ccc4dd41ce11023d545497d0c5148a02393d242ad8531b9ba92c62c1de6ac88de24c77a465dfb9a98e131a49c36ab851de42247b22d02646825a16cff7d81c69e05a1f8cedb558f52370f41c9fb93b3419d19126713d1a9f38ba3cd34461632fb713a5b7cfd505d0d9545bca71fdccc33b5c70e4c01d60"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "ddaf0f91d173965a5e7bbbdf0f0c117cf4b91887383f2fceb6b2c5ca0836ebb5"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "e12033b93d94e0714e96f362392277aea0d713f4c9695cfb8a6a4c52bc60b10df857f5e6cc91b58db53a436edf222d8de29974cb3f004462c073f6b63117c6a846ff7dfd083f9c9dd8b6b114c6b01f2ade79f06358f630b2342c3867e0605c468e04ca9a78acee0eed62e9ce74ef"}]}, 0x2c4}, 0x1, 0x0, 0x0, 0x4}, 0x80000) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000007c0)='./binderfs2/custom0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0xffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000980)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10208040}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0xa8, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x50}, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000b40), 0x2, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000b80), 0x7fff, 0x11d000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000bc0)={0x73622a85, 0x1000}) clone3(&(0x7f0000000ec0)={0x48040280, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x1a}, &(0x7f0000000cc0)=""/177, 0xb1, &(0x7f0000000d80)=""/131, &(0x7f0000000e40)=[0x0, r0, r0, r0, r1], 0x5}, 0x58) VM DIAGNOSIS: 00:55:31 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff828e32c5 RDI=ffffffff88724180 RBP=ffffffff88724140 RSP=ffff88806ce086f0 R8 =0000000000000000 R9 =ffffed100166f046 R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=0000000000000010 R14=ffffffff88724140 R15=ffffffff828e32b0 RIP=ffffffff828e331d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc0c65fe900 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe2800000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056522cb197b8 CR3=000000000707c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffff0000000000000000000000 XMM01=000000000074656b636f732e73756264 XMM02=6f706d655420666f2070756e61656c43 XMM03=726f706d655420666f2070756e61656c XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=37313165386361353430613364393734 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000202000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff8785ed50 RBX=0000000000000000 RCX=0000000000004002 RDX=0000607f1a6459e0 RSI=0000000000000001 RDI=0100000000002000 RBP=0100000000002000 RSP=ffff88801782fbd8 R8 =0000000000000001 R9 =ffffed1002f05f70 R10=0000000000000003 R11=0000000000000001 R12=ffff88800d61b068 R13=0000000000000000 R14=ffff88803df0b700 R15=0000000000000282 RIP=ffffffff81b33c91 RFL=00000082 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055558eb63400 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe0600000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f48eb7c4ae0 CR3=000000000e53a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffff000000000000ff00000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=000000313d524f4e494d00373d524f4a XMM05=3d5145534b534944006b7369643d4550 XMM06=3d454d414e56454400303d444955555f XMM07=59534255530031706f6f6c2f6b636f6c XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000020000000000000002000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000