LED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:04:50 executing program 7: pipe(0x0) 19:04:50 executing program 7: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:04:50 executing program 3: pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002580)={'ip6tnl0\x00', &(0x7f0000002500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x20, 0x5, 0x20, @mcast2, @private0, 0x700, 0x8, 0x328}}) 19:04:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:04:50 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:04:50 executing program 3: pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002580)={'ip6tnl0\x00', &(0x7f0000002500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x20, 0x5, 0x20, @mcast2, @private0, 0x700, 0x8, 0x328}}) 19:04:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:04:50 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:04:50 executing program 3: pipe(&(0x7f0000001d40)) 19:04:50 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:04:50 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:04:50 executing program 6: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:04 executing program 3: pipe(0x0) 19:05:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:04 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:04 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:04 executing program 2: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r4, 0xf503, 0x0) 19:05:04 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) 19:05:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:04 executing program 3: pipe(0x0) 19:05:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:04 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:04 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:05:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) 19:05:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:04 executing program 3: pipe(0x0) 19:05:04 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:05:05 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:17 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) 19:05:17 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:17 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:17 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) 19:05:17 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:17 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:18 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) 19:05:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:18 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:18 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:18 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)) 19:05:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 19:05:30 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:30 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) memfd_secret(0x80000) 19:05:30 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) 19:05:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) socket$inet6(0xa, 0x6, 0xf8ea) 19:05:30 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:30 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:05:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) 19:05:30 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 19:05:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) 19:05:30 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:30 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) 19:05:30 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:30 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) 19:05:30 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) 19:05:30 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:05:30 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:30 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) socket$inet6(0xa, 0x6, 0xf8ea) 19:05:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 19:05:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:43 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) 19:05:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:05:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:43 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:05:43 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:43 executing program 3: r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001c00)) r1 = accept4$packet(r0, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14, 0x80000) r3 = dup3(r1, r1, 0x0) bind$packet(r3, &(0x7f0000001cc0)={0x11, 0x7, r2, 0x1, 0x4}, 0x14) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000001d00)={0xe9f, 0x0, 0x4, 0x5, 0x2}, 0xc) pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r4, 0x89f5, &(0x7f0000002580)={'ip6tnl0\x00', &(0x7f0000002500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x20, 0x5, 0x20, @mcast2, @private0, 0x700, 0x8, 0x328}}) 19:05:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:56 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:05:56 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:05:56 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) 19:05:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:05:56 executing program 3: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r6, 0xf503, 0x0) 19:05:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:05:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:05:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) 19:05:56 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 19:05:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:05:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) 19:05:56 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:05:56 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:05:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:06:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:06:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:09 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:06:09 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:06:09 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:06:09 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:06:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 19:06:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:06:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:09 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:06:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:06:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) 19:06:09 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}]}) 19:06:09 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) 19:06:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:06:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:23 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}]}) 19:06:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) 19:06:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:23 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) 19:06:23 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:06:23 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:06:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:06:23 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:06:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) 19:06:23 executing program 6: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 19:06:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 19:06:23 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:06:23 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) 19:06:35 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) msgget$private(0x0, 0x40e) 19:06:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) 19:06:35 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:06:35 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:06:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:06:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:06:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:06:35 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 19:06:35 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:06:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:06:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:35 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:06:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:35 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:06:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:06:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:06:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:06:49 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:06:49 executing program 1: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:06:49 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:49 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:06:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:06:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:06:49 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:06:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:06:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:06:49 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:06:49 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:07:04 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:07:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:07:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:07:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:07:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:07:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:04 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:04 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:07:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:07:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:07:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x0, 0x1}]}) 19:07:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8}]}) 19:07:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:07:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}]}) 19:07:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:07:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:17 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:17 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r11, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:07:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}]}) 19:07:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) socket$inet6(0xa, 0x6, 0xf8ea) 19:07:30 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 19:07:30 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r11, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:07:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}]}) 19:07:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r11, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:07:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:30 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r11, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:07:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:30 executing program 1: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r7, 0xf503, 0x0) 19:07:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}]}) 19:07:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 19:07:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 19:07:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:07:43 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:43 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="4a515ee0618dced0ff2699f6c55040292a33fa37bff4a9bbe5bdd21c9ccfe051323d706c1ce74808337883bab543f9bb36d28717eb1bbef5b5c505f38ce040f4f6300da741b1bb8bbaa8253f3d0edac11af74c8a38aba6f46607d7c49b8413aa5edb4a9dcf15447d2bc86d7d5ee14ac534982bf67f4b884433009b29e75d2ee2c523c8e8f6e2a24a304af1f73fc560aa21674f8ff8bac126b1c884937625d81f49c48ad91b8ab58a99a2324aa652b0bdd6eb0ed73688f87abfd48fb95ce4ac6b531ddb3c5d3d0d94244e5cdab2dbb3e6231f931d7b1b00ab30b3fec2b3f53d249dd82b3ac294159091141ff35868fa31cca135d45a839bd00983f272645489e5197375dc772464b2a712f146fd1eca20c7a2826385c53efe681414be0941bc5590b178805b3bee2db7a451b2249974f62f77a2d998e06dbde84aa43d51f7cc7996160a53b13ec123052a7445f6efa7ab95468bd10eda6b48e8315fe3408cf6de36bdf91e1573b6b8a7c179d90c2afa63406a338bb82207b6c750506617d42140f580000f8538b04c109da89c6cb7dbbcc443de8fc0601a84167427e4296a2c18731442e64c2768b4c4952016dfc3143bd45ec62af3f1daf79d483e284b8bdaa68693c06fe910e5422099a2d69794469abf9c6c2246caaa2084bc6be462a8bc20", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) socket$nl_netfilter(0x10, 0x3, 0xc) 19:07:43 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:43 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) 19:07:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:43 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:43 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="4a515ee0618dced0ff2699f6c55040292a33fa37bff4a9bbe5bdd21c9ccfe051323d706c1ce74808337883bab543f9bb36d28717eb1bbef5b5c505f38ce040f4f6300da741b1bb8bbaa8253f3d0edac11af74c8a38aba6f46607d7c49b8413aa5edb4a9dcf15447d2bc86d7d5ee14ac534982bf67f4b884433009b29e75d2ee2c523c8e8f6e2a24a304af1f73fc560aa21674f8ff8bac126b1c884937625d81f49c48ad91b8ab58a99a2324aa652b0bdd6eb0ed73688f87abfd48fb95ce4ac6b531ddb3c5d3d0d94244e5cdab2dbb3e6231f931d7b1b00ab30b3fec2b3f53d249dd82b3ac294159091141ff35868fa31cca135d45a839bd00983f272645489e5197375dc772464b2a712f146fd1eca20c7a2826385c53efe681414be0941bc5590b178805b3bee2db7a451b2249974f62f77a2d998e06dbde84aa43d51f7cc7996160a53b13ec123052a7445f6efa7ab95468bd10eda6b48e8315fe3408cf6de36bdf91e1573b6b8a7c179d90c2afa63406a338bb82207b6c750506617d42140f580000f8538b04c109da89c6cb7dbbcc443de8fc0601a84167427e4296a2c18731442e64c2768b4c4952016dfc3143bd45ec62af3f1daf79d483e284b8bdaa68693c06fe910e5422099a2d69794469abf9c6c2246caaa2084bc6be462a8bc20", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) 19:07:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}]}) 19:07:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:44 executing program 5: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) 19:07:56 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x40800) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x7, &(0x7f00000002c0)) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r2) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8f}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x48040) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) getpgid(r5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000004c0)) pipe(&(0x7f0000000500)) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r3) 19:07:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}]}) 19:07:56 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:56 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:56 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:07:56 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:07:56 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:07:56 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) r7 = dup3(r3, r5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:07:56 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 19:07:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:07:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:07:56 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:07:56 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) dup3(r3, r5, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x0, 0x1}]}) 19:08:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) 19:08:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:08:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:08:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:08:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:08:11 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:08:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x0, 0x1}]}) 19:08:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8}]}) 19:08:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 19:08:11 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:08:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:08:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) 19:08:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:08:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:08:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8}]}) 19:08:26 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:08:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:08:26 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:08:26 executing program 5: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:08:27 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:08:27 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:08:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:08:27 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:08:27 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0xc4, 0x9, 0x1}]}) 19:08:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:08:40 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="4a515ee0618dced0ff2699f6c55040292a33fa37bff4a9bbe5bdd21c9ccfe051323d706c1ce74808337883bab543f9bb36d28717eb1bbef5b5c505f38ce040f4f6300da741b1bb8bbaa8253f3d0edac11af74c8a38aba6f46607d7c49b8413aa5edb4a9dcf15447d2bc86d7d5ee14ac534982bf67f4b884433009b29e75d2ee2c523c8e8f6e2a24a304af1f73fc560aa21674f8ff8bac126b1c884937625d81f49c48ad91b8ab58a99a2324aa652b0bdd6eb0ed73688f87abfd48fb95ce4ac6b531ddb3c5d3d0d94244e5cdab2dbb3e6231f931d7b1b00ab30b3fec2b3f53d249dd82b3ac294159091141ff35868fa31cca135d45a839bd00983f272645489e5197375dc772464b2a712f146fd1eca20c7a2826385c53efe681414be0941bc5590b178805b3bee2db7a451b2249974f62f77a2d998e06dbde84aa43d51f7cc7996160a53b13ec123052a7445f6efa7ab95468bd10eda6b48e8315fe3408cf6de36bdf91e1573b6b8a7c179d90c2afa63406a338bb82207b6c750506617d42140f580000f8538b04c109da89c6cb7dbbcc443de8fc0601a84167427e4296a2c18731442e64c2768b4c4952016dfc3143bd45ec62af3f1daf79d483e284b8bdaa68693c06fe910e5422099a2d69794469abf9c6c2246caaa2084bc6be462a8bc20", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:08:40 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:08:40 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) pidfd_getfd(r2, r1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:40 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x9, 0x1}]}) 19:08:40 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:08:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0x0, 0x1}]}) 19:08:40 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8}]}) 19:08:40 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:40 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:08:40 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="4a515ee0618dced0ff2699f6c55040292a33fa37bff4a9bbe5bdd21c9ccfe051323d706c1ce74808337883bab543f9bb36d28717eb1bbef5b5c505f38ce040f4f6300da741b1bb8bbaa8253f3d0edac11af74c8a38aba6f46607d7c49b8413aa5edb4a9dcf15447d2bc86d7d5ee14ac534982bf67f4b884433009b29e75d2ee2c523c8e8f6e2a24a304af1f73fc560aa21674f8ff8bac126b1c884937625d81f49c48ad91b8ab58a99a2324aa652b0bdd6eb0ed73688f87abfd48fb95ce4ac6b531ddb3c5d3d0d94244e5cdab2dbb3e6231f931d7b1b00ab30b3fec2b3f53d249dd82b3ac294159091141ff35868fa31cca135d45a839bd00983f272645489e5197375dc772464b2a712f146fd1eca20c7a2826385c53efe681414be0941bc5590b178805b3bee2db7a451b2249974f62f77a2d998e06dbde84aa43d51f7cc7996160a53b13ec123052a7445f6efa7ab95468bd10eda6b48e8315fe3408cf6de36bdf91e1573b6b8a7c179d90c2afa63406a338bb82207b6c750506617d42140f580000f8538b04c109da89c6cb7dbbcc443de8fc0601a84167427e4296a2c18731442e64c2768b4c4952016dfc3143bd45ec62af3f1daf79d483e284b8bdaa68693c06fe910e5422099a2d69794469abf9c6c2246caaa2084bc6be462a8bc20", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:40 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) 19:08:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:08:52 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:08:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:08:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) 19:08:52 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) pidfd_getfd(0xffffffffffffffff, r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:52 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) dup3(r7, r2, 0xa304b9e2fbfcfbf5) 19:08:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:08:52 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:08:52 executing program 7: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:52 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) 19:08:52 executing program 7: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:52 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="4a515ee0618dced0ff2699f6c55040292a33fa37bff4a9bbe5bdd21c9ccfe051323d706c1ce74808337883bab543f9bb36d28717eb1bbef5b5c505f38ce040f4f6300da741b1bb8bbaa8253f3d0edac11af74c8a38aba6f46607d7c49b8413aa5edb4a9dcf15447d2bc86d7d5ee14ac534982bf67f4b884433009b29e75d2ee2c523c8e8f6e2a24a304af1f73fc560aa21674f8ff8bac126b1c884937625d81f49c48ad91b8ab58a99a2324aa652b0bdd6eb0ed73688f87abfd48fb95ce4ac6b531ddb3c5d3d0d94244e5cdab2dbb3e6231f931d7b1b00ab30b3fec2b3f53d249dd82b3ac294159091141ff35868fa31cca135d45a839bd00983f272645489e5197375dc772464b2a712f146fd1eca20c7a2826385c53efe681414be0941bc5590b178805b3bee2db7a451b2249974f62f77a2d998e06dbde84aa43d51f7cc7996160a53b13ec123052a7445f6efa7ab95468bd10eda6b48e8315fe3408cf6de36bdf91e1573b6b8a7c179d90c2afa63406a338bb82207b6c750506617d42140f580000f8538b04c109da89c6cb7dbbcc443de8fc0601a84167427e4296a2c18731442e64c2768b4c4952016dfc3143bd45ec62af3f1daf79d483e284b8bdaa68693c06fe910e5422099a2d69794469abf9c6c2246caaa2084bc6be462a8bc20", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) 19:08:52 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) dup3(r7, r2, 0xa304b9e2fbfcfbf5) 19:08:52 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) dup3(r7, r2, 0xa304b9e2fbfcfbf5) 19:08:52 executing program 7: pipe(&(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:08:52 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:05 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:09:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:09:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) 19:09:05 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) 19:09:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:09:05 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:09:05 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) 19:09:05 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) 19:09:05 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:05 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:09:05 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) 19:09:05 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:09:05 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:05 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) 19:09:05 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) 19:09:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) 19:09:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:09:18 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) r7 = dup3(r3, r5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) 19:09:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) 19:09:18 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:18 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 19:09:18 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) dup3(r3, r5, 0x0) 19:09:18 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) r7 = dup3(r3, r5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) 19:09:18 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) dup3(r3, r5, 0x0) 19:09:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) 19:09:18 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r3, r5, 0x0) 19:09:18 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgget$private(0x0, 0x200) 19:09:32 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:09:32 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:32 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:32 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) dup3(r3, r5, 0x0) 19:09:32 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) 19:09:32 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) dup3(r3, 0xffffffffffffffff, 0x0) 19:09:32 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:32 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:32 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:32 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 19:09:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) 19:09:47 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) msgget$private(0x0, 0x200) 19:09:47 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) pidfd_getfd(r2, r1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:47 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:47 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) pidfd_getfd(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 19:09:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget(0x1, 0x2c2) 19:09:47 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:09:47 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:47 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) pidfd_getfd(0xffffffffffffffff, r0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:47 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) dup3(r2, 0xffffffffffffffff, 0x0) 19:09:47 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) 19:09:47 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:09:47 executing program 3: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:47 executing program 7: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:09:47 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:09:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 19:09:58 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:58 executing program 3: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:58 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 19:09:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:09:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) msgget$private(0x0, 0x200) 19:09:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) 19:09:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) msgget$private(0x0, 0x200) 19:09:58 executing program 5: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:09:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:09:58 executing program 3: pipe(&(0x7f0000000000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:59 executing program 5: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:09:59 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:59 executing program 0: pipe(&(0x7f0000000000)) pipe(&(0x7f0000000040)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:09:59 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:09:59 executing program 5: pipe(&(0x7f0000000000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:10:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) msgget$private(0x0, 0x200) 19:10:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:10:11 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) 19:10:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) 19:10:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) msgget$private(0x0, 0x200) 19:10:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:10:11 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:11 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="37ef6941d0aa7b9c5de1b0ca510720779c6461992e60b9d67e120e48b026c5d8b4b5d643a0081a4ae2a410b149ae8e22f2ae0b637203cb16f06415df5c5fa56240a0791d3f8541be163613344a4884a0d270f9890d8d1a826d8d625cd041c41526b5f81ff6eeacb5bcc4e8a7f96dc276c516b00a5ea06ad0abd48deb169fb2b898b5945f18424deedc804548b4f35f0323e76872fa3d360f6838eb22cbfd76f707f20bbc15927928f308946f55d8b9db6256d5cf45fa3630f8e7b034b6048583fb2685f7e936c5a320f5664533c411072623c75fc2596ee7aed35715435aa38c4124259e41f9404ad0eb0b965614e60d98df8f949ef3ab642977e1d698b8cf64ac54fa708bdef8928c5e5e8f733fea4dfe55178f0a2f1c090252b42bb0375aca73ce27344b60cd52d41d00c49b7ad5417a866439f56e265d58533989d5cb05b702bd0d64db2e0e3b0c3c824f8ab29883857b26eddfd5b37ae7ee7dbe480ef14e7b45489230792dafc672591cc6a1c6a01f4ccc7cb7d0ccde9214356091f8fff68c588ac91a164c5368a734e83e0835f01d8d1b57875c5abefe7e21386ab5d3fe795b1d47682cb1542c3c800454e9bfb744a72c02cee2f165c1c201811cd22880aa3139ed38dc108b66384cb30b5b1cb8d82ad8d76d9141bb3719b759b850a73144956fe6b2261d6447626e74cb27ddc10ea23b418c437e2b0ef716f7e8fde6b687df0165718dd41b716434399747ad69cab04c4753cdfbe4191da3daf5b7d4d99ef630daa74200a6b662ddc7df05226e7f349ef59e4fa2799d5bfba9eb435dc878dfe248631e480227ea27d2eb0e29c75795341680a6c7a2b02987fc072411cf73efbcf7975b71105b97b9cec569868db2dddf76f2ea4facc1d4ba09428b7a7a56f5906c84d11bae83a3c67f0f1f1bf1a598bbfdcde62d3db77e879147e36a759196aa5addc81b70f511b26b81ee55a66f72e52bd483af1ee18e98504619fee56c3dc723f17b97ae29a96afbeede48ed965b3b988da2acbc60f4236253bd13b46e6c8af11abb801d3c7c616b4d1754ca19ac086924e936869c33843971411ee4b31a5e51d3056b7133a2676bd0a2d8490c5caf465fa7becd022298ea3e1dcba98f50a7357e18701bda8062d69e06befafd6556f3341529af7a0d78212282916392a5d2dfefde997264a8f252bed250f5a80873813c0e83727a08c1bf8aba72d61b5106c0f4793853000eb8fa3bf2720f248a7ec726b365736210c369052034f95cd9112bd7bf3c23c9c298558418ccf400bb2f85dbab2e7301bc2c9b4b14d61dafb3fd962bdc22397939cd1143df67f0f1b784892f9043025f72d0fb79723dd1ecb70516a5023375913aaa5ff20cba1d3239b97ef3bd5a2ac25f09fbf4eed5d546212556aedaf6156494dc626a88ad31418ac4114d747a7e9c5db4cc212116cd2637f47196d53d62c21d37d92230f9638ce01d2d33c56b2d343524833df922837a464ae8236f3324054ed5a4465bd6a3d4682715c7c0d4a83491d91b27453803906c4b081a51797111e8824448ff449f06cde65e236d09a86a7aa0da50a489d8d5a96de50f112af4d6ae42580738233d866799598def5d5271a4e8adb10fcb100655642509275a1bd640d7a26e288eb32dfaceaf7a7939da7fc56b8499e1e145d3e30392a424ad565e288e17aa74db2eb2e3c97e3df37ed2630036d53654afdbdfaeaf1be5a1a09f9918419564ffffefaecb2ef800f4aef54a4b43edea6c861012c2a53e500e6bddcd89df191a0fe07a6e011ef23cdb17ad93eb262446d5fe3ec8ece4a1d969e570904ec835bb77c785400c63c9f445f41ef15b6e7df3201665a054030ea9cb7395d69e30136186e7b9deb6ded88acf2c931829b129615a1045105e5942d147dd112496fd26327b1052af98d56ff150d716a49621f38567e4f7ba641eb9648edf3d4bd1e6717c29ed953484f0cc8dcdde2c166f998176d2e2b38d2d9d1772fe0b37d2d37a86b4700ac8755c49983b32d7d4294f62f925ff8c2058ffdabe8e14ec9d8371172957ead6894d476540a12796285f1fe819d21d4af77fb8a3bef776477fe01bfb71c7a964d4655d75d6cf4a1503af5c8147b599f95cc9c0f605b83d1878b7e3a1c806b66187cb414881e97f826c9afa252a2df12d8f2d6b9849ce5f1591e761fd6a04aec6eff64c7614321d6b44e3604a42a8f849b33c462208cb27bb86589cba608aae3e499e59d3f7cb03f636f5e09a2401375c2dda030d8db280e49028f58b1cb20f8b51cfd46fa7b74bc6796ed9621f4749483789a3096b452fb39a33dc7043247eca70d7d792527ed0bb13726f55246a9fac68dc7f6c133cc0f1e47bec13e0dc4d75b61bb54365d746a640c8aceea2ccec739a34c16463eab4a3e9bcab93abf8699f92ed3f5efd2b98bc5718234c67cee0c2ab33bb2c7451cb1b6cd7a178ef52f55bd15f181230ae54c9b823c9c9ad8193ba6a29ca837ffd2966ec4487ffef70434c26569770707ff117973d23683baae8fc356bcfd3eca597d5e0952912cf9f091fe073f7e9d63d4d3178921d3734bfb389a69ea6675bb5d2bc055c25f6af42a8e7f77f6b3e23fc791d05d19c8aa4cd10be510b4497230636e1c4bfd4f9b434e1b1ca2ff8f54a68ca2e777b4f1ad2f1b04e543eb47649109dbb57c8370f1d960fce8943ec6dfeb13a4da5f5a15a64643be46ac5dbe53b1df26692b1a282b6aa51588a1fbb57f7e269540a0d2d16743bec92861574f814acb557cbd7c6d2211ddc3e23320a3156b4c1cb4880dd9f1912dc6059f70bf8c38b0ad50728fe95c890bc76f7302388ba4130f832db7122eec234a9e8fffd30842fba8c9b8c9e4f7d1e8b5c2fc67363beb1d5fd903ba68025effc63a5263055ff856c8e9b08554cbf258171497cd01074143bc034ff7e42e4ede9019e9817b5e04d84cc12948d8fffdd2387ee03137c36a6cbd66c62de6cac483b04b0b87570f76015f2d4e87364905b2e978a9253c681a388a37bbee4ff27a66271df35c742c4a97e5b16d979b91e80b8a044a0b4c8a8667ce29fb7127ab715e0c20bd065f538266cc0a641af02e412a38483c398d2b13f14285b724bc783ed077e328e2c480a78c6f97d009949c883c63e625a841baf60732fc6a53ae51a6b6614c8c73b767785685cff25f121c498dc4d3831895e7794471d47767d23ff683d2452769d37c57a3314741fee51ff3c37ebc49e426207cad5fa55477b401b6a912590f12bd74d7355bfb93cce51798f8e8e51e4852e819741c4a7bf54bd1b9fe72da505a94461402fa897d6776e95d948ba60b7ab476335163df0db5e3b1192988db1b986937a600cb71af362cedcef94625b4829e6f0e878ac30f750ae0f785764025a66406b19796938a5d0b49e31c542e4d61f9e7f11dbf7ee3410ad78d2095e3eeb070f7e7b23813ec4aec1bc60fdd841770f89f1b243719242cb54cff5d1f48fc85bbcd9e720d8e8306c00fc659fd1ae2b8476b1d4a73e75cc1a6b3a78d11a7c16d1ce2c4c1ccaf7fdb4577c2a39ef57b5343927b1d30d51a07f5586ff7c46131317c57c69fad9cfeaf934ce51c0c8440ece95192ecf3e22a135638cebcfbe003996570fbd22a0d21b1a9d5ef8a9b5589b22818b0f3e9e3f97dbe86356f0e8855ddd49b98c6d49eda6541d4ed716df5dc88d63869238628308f96630ca8231b95ee72f761ec2b2c98f2bdb599deec753241c45454f5e9cf3c17387bdd9533a898c9e286b5d7714b5854410d490eaa1e1d36adb54a7d9ad69b7e8b4a1883264dbfb8cffeb04deee8b7cc40f8b9b5af76152673eb549518fe41d305a09f864ad90b7e706ea07a4175a05a75cb0fe8d5b87e38edd5f628b9c96cc3093a65ed77e06756d48203030bd18ee8639ebf31916bb30df7a35a82ebb820a776c6d5cec45c0bdaa6c609472794e01a364672984000aabe6c8049092564c1bb27c22d5d0f3567056d80de0274c3ebceafee6532a3119855546b782ece8450c003508c40c717c93119a07f46b3dc330b8a08040a4281a0fbb54dd01a9b5bf6ac953868bfc6855fbff52debaa6ac817259f8a368b547cffcc0eff94c1917f945cf4746ebc27fb97efc6ab89a0e17d8c212ed164c67a51e0eba1fc0ad211ed30a4260afbcbd8fa68b18cc1b844f7084e1257d8eea43931c8643ef350242cec9e9b7d5a223290bb1e8e5e19fc2016c8246eb0d4a9e5bbff6b99dd8ee63b3d40fabb4b6d5076390b6ee24f9f6d8cbc3416681cec56ca0bc552514ed59fb271ff2289cfe0bf5515701c3405df6582a6d7f31cc34cc6a342ebccf469c1fa30604bc1a56725a381e14c86667c0b024687a87b81caee2c2a67e1edae708adb41f9d1859272577b86ea648ea538193d34de4e6fa647c5f41b46426b1cd384bda01bdde43853fa0fd86b73c31d437bed7db79a0b89f97a44653407724901981adf8c84db7d5e6e47226b6806653cfac1ceceb3314e22d3fefa01a1bdc00887af6394eafb4aa76430635ed02fc5874ab2df60ec427289137c69b1a5834ee9e5e54e6d2797d485547101bfdf103b5ba0ef7b40b5df5c5107290eb7d30cd2d2a31fd5ff42df6cda8e69ed9e44b94e209366677695a54bb8846c0a9446321ca78a0cf86347a291b2357f8d17bb8e12500f238eab39bb638279a65edb3aa6901f6a747e70e8ab08bd62d3118c5e6a4d530a3c3bb600a63770671e794a5f85643c7223bc0ff47b74cc30db941adf48c220738de72378b9e92131890cf29d72765882ac28ed0ef5e67d1d94c877421d01d2dcdbe5450bf81a8ed6824fd916323fad8c8512e27955235c26c743aa9b1cdfc9dfaa8fa378437b5bc390ea43f3bd5ac0b52990532f73449eaf24c601dae2c76087ce634fd7e68552ab6e72f4ffcbe51357555e3b6798e7aae1d342ff0155887cd5905006845d375ebbdfd58ebf9b2f2af07270fae502d3c0cfb3510a4fc2c37e6c5401538b740e3e4f54e43f8f305b4a2b657854a739db46b44044f50cf7ceee5fdf0400a16a0a6a90d9a8ced01fbd15b023406b39d528cda4ac4719e9b8f4aa1b9a8b46a5476bed67488f00e7f847dc4935698cb0cbe1a4c0ed4784a931c503aa0eeff0166c8861130ad7596d3087a7c0360fd6560279d9e0869e8d1ec18845be054300e01bb93343c0d7b4443676c3cd1d3c2106a15f403258638c5f7cbe3aafd31ccb5dfb101188513f2598499d6aa521a451390ac5c2c75a7b5ed298f5740de9f7deb2d5bb0a82ca6b087ce7c65c2e27da3124104a7f5273d9f6b80d0f6100d50cf836f19251ff57075a615a672087b51ce4e201bb95a5ee3b3d8514d819ecbf31242c2325b7cfb9c502b80fcb4b2dcff8ec4ed61b626ea2a3b46f44b7a60d0ac664a719c2eec31e01fa884be1b4c3ae4c2b9885ef5eeba28987df1b7b6df52b64064a96363ff6b3641a16bc9ba7b9e189de160211ea5744e6c3ca3618db32a0ac0f21fc747610cb719db6c5d95f00926237a2b81ebde0902292d78f9086cb4ed13981b984f3804f61c923aee0e2ca2c862bbbe8d91c06555d261e918980f008c33cc74e11c65eaba2c301b3b9206e6bd30136c2b750ed1c6c0e6e5a7a00e88c551d1b222c075bd44d08c148e1781026d706c4a942d8af4b31ad258ecaa328037cd6293eaf1101924cf028e7ba9be613b7865d6a4dc91942f1a277411436cb176885385d6d7f2680322efaefe58d437d0260a760b1d4dc85cb9ff58f704309810fc0c2d428c6d0e1a7937044581efb6b362e0d8eb4a4b2060d03501"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:10:11 executing program 3: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:10:11 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) 19:10:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(0x0, r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001780)={&(0x7f00000005c0)={0x1198, 0xa, 0x9, 0x101, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x5}, [@nested={0x10ef, 0x64, 0x0, 0x1, [@typed={0x8, 0x34, 0x0, 0x0, @fd=r1}, @generic="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", @generic="d320e6f892bce77232116ed089af77a7cd52bebe2a7111520d07959ca1e5f8d8cdc1573964798fd6ee416db7fba75fca9885b7b2b771e31663f231f61acff342039db0b57c72a7221738c750e9c8137e7bdbe0dd59c89c2a2e46b9f911f268dd273d34243d3aa454afe1d86d68e4ac24b3adb2225170518f10211784fa49298d300814624a6d38e129f2234ef8d20a1b64f9caffbc51a84f7a49ef1332c4decc10a97171238c911ec96b431ebf946cfa016d3d19be8ffc6dc36ac610f444a88dcf305d0c1fe9ca483a16f94882ad370b9139f0abd8f6edd8f7ac482a2dfbf3eec17a59"]}, @generic="cfab47d9b38302abb57c13df", @typed={0x88, 0x59, 0x0, 0x0, @binary="460697a9a39b1b18f32115b5a7e994344d1bd04e8db18e5bf74702dfee6b35267d1bd105fcee6b3d317c2e1e927e5411b333a2409208a55278192ed7caa00a7b595c012137d28dd7d064741929ae341dac6bbdbb41a64c3dcd047118355d68eec3b63a642d90effb4648af54d3e57302475c72f67840271c9f15526a1549fe8679ea05ba"}]}, 0x1198}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) 19:10:11 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = pidfd_getfd(r2, r1, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000004c0)=""/150, &(0x7f0000000580)=0x96) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r5, {0x1}}, './file0\x00'}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000000600)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) r9 = dup3(r4, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x4, 0x80, 0x0, 0x5, 0x1, 0x40, 0x0, 0xff, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x7a, 0x6}, 0x1a432, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x7f, 0x9, 0x0, 0x40, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x200000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r10, 0xc058671e, &(0x7f0000000b40)={{}, {0x6}, 0x19c, 0x0, 0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)="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", 0x1e0, 0x0, &(0x7f00000009c0)={0x2, 0x9f, {0x0, 0xc, 0x58, "358cb28f245e9abc6b1eaed781a7821a51673c7f05165594f26ff30c5c74e0485b4913c1a3d8171de697f5fb9a2910fe111e1b1d2337d53c24e75e67e103a640f8635274e384f6dd2699c9cf1540d20ddeb28ff86fb3f383", 0x3a, "712e058dc2ede181391a676eb5cee8617260db1c6352625f9b3e5dbde071f1fcf327ec5fdcaa6b6e8127253381b6211231f4b812be2f9b7579de"}, 0xa9, "ec7c2da0b1d65072012b3b2f4b0a06aa118f58127c97eb2a432e66111591357dadacd1ecd1eb20407cebd52d3bb365f3042b4610c09e7a91f21ccfbb9c59bc9bf26e73171ffb9540386f05bf0bc59d0a96510f3fb1893fbb72541843bbc38a34c5770bbd87846304e914db6a76b3aba9c352de880426ff5c7eee09fd1046064a36b9062fa887f30b5c0cb3f49a862657c6126ade7ecb42e46c5b072fd9cc1d8884837104723259d736"}, 0x154}) r11 = dup3(r7, r2, 0xa304b9e2fbfcfbf5) sendmsg$nl_netfilter(r11, &(0x7f0000001e80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000000c00)={0x1230, 0x10, 0x2, 0x801, 0x70bd2b, 0x25dfdbff, {0xc, 0x0, 0x5}, [@nested={0x30, 0x95, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @str='*-}\x00'}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x5, 0x7f, 0x0, 0x0, @str='\x00'}]}, @nested={0x1166, 0x72, 0x0, 0x1, [@generic="9655afdd4aaab4b847ef37561071dd712cd7468f3fc00e786bbe64b6ec582f420f823b4f9c1744c31f6d2b4f925add15d5dcc6f2caea7327c532b39f1e2725c95e728d65f5d27be5e553a9fb32c3d2b2326d99fd9eedb553caaf7ba1d2af63b2ce1e420d71947824825629dfcb5e5878bb0b70f54b1d39ab5539de233b8673c2962d3828d746aa14c4a8c9db72d799a66ba0944305cbb969d184dc0926178397d9dd32dd587178e9ff91341593731810b7ace998fc605b52f2953e65f466c3274417710fa1a0f22200df9f763836dff632741d1cd34718321ec1414d9f3af711cd5fec99cff9ec", @generic="c6cfcee31868961655353f6402d6a51732552eb15276a80af593f8c1f2731de3203c6f4b1f5363c3f660b39a1cb6e3821e8260171bee0184eac3262aeb52a7d1d07a4721d5ddeee06f0d3abc58c1af", @typed={0x8, 0x41, 0x0, 0x0, @str='$[[\x00'}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x7c, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0xc, 0x26, 0x0, 0x0, @u64=0x8000}, @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1d}}, @nested={0x60, 0x6c, 0x0, 0x1, [@typed={0x5b, 0x63, 0x0, 0x0, @binary="5a4392e04931391ad12bf97895f02b2949540ba1bba1b1eba8739afc7594b822848fc7d55733b6317c630648566451e566dc2c6698573f8b8e2e2a3a6205c04c6b7633f4e5bf97dcf33da5bc475d94ef6023a46f862ab2"}]}, @typed={0x4, 0x80}]}, 0x1230}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002000)={&(0x7f0000001f00)={0xc4, 0x1, 0x0, 0x5, 0x70bd26, 0x25dfdbfd, {0xc, 0x0, 0x8}, [@generic="85fa08fa558e408537d1f9fd0b3fbc9606e6db741507c521896d234658a8969eeb65dfb18232b119a327c4ed616afb84a75b3a83558c7f4a783eb6d869f13e2efe3aacbcb7d4f072fac6d0bec0646c84058ca772a77e76a303ba9710c0e5221013e1e2e029a6c1e1204a144ea7ded03e170082dd002de0733893d84f21d754b59307b3721a0737278b7707d2f03ae1533e711ee25c7f5a175feb18c8d146a7e675d58df7ccd891821f464b4988"]}, 0xc4}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) 19:10:11 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r7, 0xf503, 0x0) 19:10:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) 19:10:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget(0x1, 0x2c2) msgget$private(0x0, 0x200) 19:10:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001780)={&(0x7f00000005c0)={0x1198, 0xa, 0x9, 0x101, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x5}, [@nested={0x10ef, 0x64, 0x0, 0x1, [@typed={0x8, 0x34, 0x0, 0x0, @fd=r1}, @generic="beeb118cee3222702d34ee60b21c90240f33ac475419882e547dc4c4d506c8d6b5b918e7d94d298140323d9e5ace1439d4f7b25918dcdfac375d1c9e1120202a14250104e8547e227a6e3c5fc625aa9da28fc0ae52c19397b4a21d1c6c9bd2eec8b27ad5cb011059915a4d8edc5a9de70121e6a8b7ba9b5696a858dab88fbd569a9ddde71aa2999d5014608b907e9cb37d4f87052d30fff7e2c59569270c728da914cdbf0dad2f11d861cff572242f0972e4f5193abdcbd40ad1e8a76414d1dce0724a6a41107d841a481c88e5a4452064bd36cff3470595481a174c26dc28829874fdeb2fbbd21026f6c73c43d1961f1edc72e13009840a7d4b4af782c3223d3fc2da390f28c462b60d83c231eb076ef700be1b5c778dd78e88387918673e6dec351bcd5f1fc6a16e30b002007c852296bea7ecc4c2043e4be54426b1106855c554120f3dbf22c5ca6660369c138e42c98848a1623e66832f83cbe747383809749f0970ac5a14728d9f32ad009619624610441a6d5148f9545622abcf577f2927f3f2d172f3c24398c84c9bc6889aba7534b7b719e5db2b381465dbe3274a07f346674f3e6d3b49c94b55c46e4c19a24d518745dfb0c0c4d5c5ea6e3d5c120863c507ea55b7bbd9c5b1e8b2de6898bf1b44ce20108b17acef96ed399946cfc957440e57f751958524427035277e157c83ce0f363c809b95f88d576ae51c528a4ff8ed8478189c5cc2589478b1b878af87f58f4748c0eda80b46cfe684983ea41ad569d236a06f0f595c193292fd71cc8be304171c085f860a5c69c6a74af819a97de8c1e0ce8e0bd278dba30671a5aa150ed9289a337d254b786eaf5ee0594c2eda1437d384af94b71de47e04d75c473d20e75d89348968ef526407b4c96dce1b5ef81d6797d3892c92f57c79e3905321da4c0bad51a0f9a1b4675ebbe7b3afe076399f0c9807569975742b018dc5ed96b4f4ba11d104efece767c15f413ae155c8265346f00a511e2353c7c9db4414294a6dbea5f00d51811e8ca0419cbf335df92be8c2aa2968c150227eb736fa4c18de493c87f649784bbaac9742990bbf91508d1de46c9273f7c883c98e1426c46f4412284243eda72daa00f88c83945822d260d158c64508f127cfb58ac9b9a36150a45d193b36b82a70a83f0fba7f094088ce34d3ef18867dd198ac983d6917f61b5e18ca65d80c571c6f5e6628afe46df047e9505f963432ce3aa09b664e514cecf671ae605b3d1df097fce54345487d58ee477d50d6f7999f5465843aeb038dc34bbde06bd61f6e70b9a68de23955a734e989cbd0166a6002eb04714a2a7c3729189bde721b37d9655dbb643a97398d9f24a1152544928f1e95675879a480f299e294a58fe95ea741ce231e48046c071c1bdfb16734a619cdb95329dc56356814b044cd9ed5617c262c06a5023ded93802e88a9c34013c3a07e1be45b3c591019966dcda4306839e136c026a11c8989762f68dffd1cb258165dde612542b09cf0f2705d6f72359fde6068fc5a9310e770a79cafafc15afa9ba6d0bd243703d850be0bb46f841114d43c7dc8eac8b910e4a0d73067c19b65eb952116ded837dafd3890aa3e07a17b02b4be38d90a6827b6bf2c111d70b59936222afa560fd02c82700a4fdcd7e0530266fbb07d53948075842c8b6e77a8974a14bf18328c4f63815c84bd48f661e2cfb14ae4cb9658574c60eb208d07d255bee36293c082d45975fdaed69e8e34e4f4264930c548c0dfeab74a2b791815f19cbe4706ae9b26465327c9315261d55b812b753add8c37aba1b3bcdcd4f46fd7f1522e936af0d3a2883a3f5aaeb32cfa2b61de5c1f3d9121376ddd5dd8f54e8b8da8ff9c6bb546d4f735d458ed4e9dd1e4b79e7b21599fa9c7d8b51a86d73485c25c189ff7a7acef31ac2f92f9270c14a633e869c9e3c953666da37747e37cd9979ecb92efaf38fd230ce21a1d0eee4565e422a4ab37fb0a3ace9056ef47f8c94ab73f88f17d6cb8cc14d96847d59b26427632e479605058fbb643fa676354b2ecaffe391a954ab0df8e4f91637bcec507a87ae8c817fa3fab6bace3537d28301c6f4cb1321de3454ebe0e4c7cca24c3ecbbc9a5d809ff2d47bc7bfeac9627d4395aaa831cc8d6832ba797b601988786aa434b2a4004435a30ddf29948bcc2d747859dbf6459c460c43d912ff80cced434acb6682ba47d73c6294f659e40434b8f92b95701a02f2b04cb126d47369d9059b0c747a0d7bd62efd7e73c8d93676b8a37e07ad256c2b4590ca553f0e8545ab2c8021adce53a2c1dba56f2d30cebac93c11744a623f4e2ead43b47a7af1c5e0f58c56cae7839ae2d8bebe037d06705a2444648e65bd4ebfdaa2bffc924e6d72ab3b49a1b0264dc6068c38829a2d036cc1234561c7c39a017066bb27e797729ee6978e902d3a52e50b6beb652fee0ba5a28bf59c100f1f7773c16ebeaf4f82be5dba826bb9b4499047ad02bbd31635be516b51fb4a835819d520c57d58dea2a3a340a28d7b0484c085732062da92fd29a695c7eb78f68c5b6b49a3b8faa9f918992696855bdb110c0af5e1f36ca618cb8964076eafffdf27174ffeef4d3243871d9c37f9fc17f1ae34ff68c855c28394ea1b776e3c71d1189b808399d62efe997ff72bd060902646716e97a475fbf46ade05c6d0baf87c2665d1404a5ff07160e711e378138452b50c831133df63aa9070ff43022f44d30e402e4d92ed4a14cbc41bf68a186049bc3b2c5b1d7fdaaa8344352ab41c7f196898ffabcb036b7776ab47bfe3ae5d09f0ebb7eb296fb520ec8bafb67993ad0c83a33d1dbc54144459f7dcc6a91bc0a2bc507930532e3be42e225639aa3275410addde318015857a5d217fb2f8005013138e14c74bb2a3fd6d9396e24bd216028da57e89681fb6e367b15522596b1ce14306397eeb8b8dbbc00d5439c853902ffcfcffcdbe95b8d4d47813b187fe92d45afec73ac841ba75d921b5cdf477544aac17b05f7240de2d27d9acbf77a26214eee7c5251f65f3a376e34bed717ca6ac6a1f945e1861534f3f36348871188234debb6c3b345e94a97a9c8c81fd7b16349f66335784ada869359ce569407df573c07cc3e716d96402b849dbb91bf633a5ea86905b59a2c585c71375e2e907bf30e50df82cec99be34a3982f922212ec8bb7349022661b25962668d26aae0d3e9fe54261308ac2c46e789e5c5b3c565a708d6f1075c2a19bae9f596bf7f9c0804b47871650dbad18f24b8066e18acb9a61938a393cbed32532e40512371f7634fb1de980e3b9561b5c95f3a6f132588a84650474e82e3b1e3c097a8fbff37cad2067a9ffab90d4db77364fda0f0c1b56bca98bb4449396e46e1929d43339090c14c02f48132a153df7d3cd9188287e3ecd70289b8e2fc95f0c3c9d79d1495c9db2a7600187cace7a2ec8933da32870f7b94c2eba4b7866a21bb706d4768e056cb4798edefbad57214d53510443a5c25f0e1f51005dbd45c7fd72bf65ac29bc1c7a27492e44d155972053dcda469de173e5a6c64e428cdd0b1f1bb57b97a5a665a1983a55d3f1c9b5b60715abe499e2d04cd0038ff42dd4d780328494e663ac9016bba9ba3df5ad4c2ef2c484101468d9e8d44732e16437148fad93305a9fe7d59b4d4b65529c63f401be83bb8bdabc82c89e5b074d37cdaa754462ca400d030b36e4ee34c8165a1f3c6e6fb429f268bda80e35db8fc1265f38a8b602c21f5c2e6a3abe430ff7378441f1b01c10054f0b89ca4eb8b032e108a5a928efeaf3456f71d3b9a77719ad752f1980c74234d97c9abf973dc02d83a35e96dc54b5a1cb4552a81359728d32dc8b3d7cc4c8ede25018dc29ee513c8b845916f0108bf617d73df5d4862fb3b0e94ed0beace728d0588699cba736b63494c65698655b6f102642a112f18291118675bb98477902bbdb0507cb81ea81aa32fb52ec8efc629f6690c993ea96cd81d79fca0e4da0dca7528a9d5c0503d0cb33133268a76d27d3a9cee6dc641f7b226bb817cd25526d8c738cdfed7dcb6dc20a1a6a90fe6989094c680b0f8b820ffc3c1313a0be0696678388a5f5640779b208ae95da67adfa72b4053f2496a72cda289ab90fa78d8db9bdc1e463fb01d31c7a784713f72b964a4a29734b2262065e4d9e99401a22437dc9c47648a1c5a227e98e99a940cabed209d444af42de95090ae99e70eb50c0f877fede6c57ed097190f5b501b00dd1fa072048244d18667a735826b88848fa24d557669162a5e912cd15dc5a8fe633c692fff6ab43620530535d69943b9ddc66c972715b6e69e9332d4d8c800ed58e7f705493d6c73f41a2e7865c673024beb19d75f1d9f1a7dc957f4a4f3fba775cf92179c3bb90d65967eb86f01caf355e9bb95095251ee0fc8641777d9354cb08d32e0bc735c17f95238801201675885c59562c7b8b03a956e77c6ea7a88721a3367e3f22502359a4c5d0fb7319fa7c06d45b885c62060aee4169c63df95a476563550b1d59c69775d72e290c02afc1e82902e8747a885a3fb0c39201538017254eb4aeb2ab00b82fc15447ee4dd333237c7a181a103f03f4e431a3afa1330aacff52b2bd217c4f149db392b5c121c54ced83c16ef0d48ff96f202c7116937b8e59a6a9010e087c535e31e6a6a39cb4cfa0514297246b70f5a88efa39be49dd5921b97185cacdfbacc5ce6aca4158fcb7de984c8e8227f3bac60bfe766cf3263c85ff934a77f9b568c5d45008ec26d347a57fcb357af2571afe2e421f55781e5574ee5a6386a7b002830bfd1fb51c6786d3e835d749104319c81edafdbf02d827b2fa1fc06621c13b3e77466cf54953d8f5b11b9b3763f414d7e913541a87124fb0a33254b081712d4a098193535bc7c3d8e024f88b1524597fe198c9fa6c38db24910de8000c98567bc3e742cf5a267ea8c75a9416a28a6a387ffa1245fbcda5e781b93cb0c76bee2d8eeaa3572ec0b46ac14726a8234f6b8f060aa6acfcb80f9706f71c8162eade470db96c9b38d6f9582e1ce1a2d3ba943cdcdb8ff76e5b96c98495f1e9f30079f0922d6b250f1ac5d11097eddda7c76d3dcb737c7a4f2ae6cefed060db9a9e7e3e2e22a70ea5ed4b11ed5624ad2dd2c825ebb0ba98d25aa9daa5666688ecf7877e5b97d64ae344751ee75fa5d1f090e33fd0887d1e8a9ad6f7388c1c9e8851f5f15e6b422dd3c199c528fbe9b20e0e66ba78c676276ca64cfa7f84c73c1dcd5c006ed920034fd5adf901386773a18e076ec17724f82e549af1e4b75ab9faba47d17111af3f82b88221510c98ebb9537fc2da7b8fc9e10d5cfce7f9bac77057404b23e3040cb1f292016fde1b32bbb5ad57f3bce40d9e84240965de90ed4fa92689b8020d566ed4e1027f8b71a4eb929ba1d90f1cfcb26e25adf6d0c7f26af37be884cb29533a91d800e1aeb620fdf7e4bb9431ceae2fbc1a2893cdc95a2ccc6520d07134ae3f9c087a906dc1355b940d9e5a9f394a7a3446e1baee643d2981210a0c8254575d920afb2d4c9ad209d2a01668854620284c663e906d1a73cd9d66b19a9ac9c61b42796f43b70e44924327f1ffd4d83544105789587373d37766c43b0a81b29d0ab45bccc5b4ffc98328bb8a527e3ea821955a8c5374cf1f23a401036bd13c315fb5388327bc007b0d048266bc7ed0b217aa7b8c311162babce481e7194760d92dca031e0883212ebb953f295e87fd8b2f01b33533c48eacb3e8ffb6d987003fd5626d143e5e59b611a9191812720c798f3a0972005", @generic="d320e6f892bce77232116ed089af77a7cd52bebe2a7111520d07959ca1e5f8d8cdc1573964798fd6ee416db7fba75fca9885b7b2b771e31663f231f61acff342039db0b57c72a7221738c750e9c8137e7bdbe0dd59c89c2a2e46b9f911f268dd273d34243d3aa454afe1d86d68e4ac24b3adb2225170518f10211784fa49298d300814624a6d38e129f2234ef8d20a1b64f9caffbc51a84f7a49ef1332c4decc10a97171238c911ec96b431ebf946cfa016d3d19be8ffc6dc36ac610f444a88dcf305d0c1fe9ca483a16f94882ad370b9139f0abd8f6edd8f7ac482a2dfbf3eec17a59"]}, @generic="cfab47d9b38302abb57c13df", @typed={0x88, 0x59, 0x0, 0x0, @binary="460697a9a39b1b18f32115b5a7e994344d1bd04e8db18e5bf74702dfee6b35267d1bd105fcee6b3d317c2e1e927e5411b333a2409208a55278192ed7caa00a7b595c012137d28dd7d064741929ae341dac6bbdbb41a64c3dcd047118355d68eec3b63a642d90effb4648af54d3e57302475c72f67840271c9f15526a1549fe8679ea05ba"}]}, 0x1198}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000001800)) 19:10:26 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:26 executing program 3: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r7, 0xf503, 0x0) 19:10:26 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r7, 0xf503, 0x0) 19:10:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) msgget$private(0x0, 0x200) 19:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget(0x1, 0x2c2) 19:10:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x2fb6) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0xc00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={0x0, 0x8, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = memfd_secret(0x80000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040010) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x0, 0xff, 0x40, 0x8}, {0x171a, 0x6, 0x81, 0x2e55}, {0x0, 0x3, 0x2, 0x5d17b850}, {0x6, 0xff, 0x5, 0x11}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000440)={r5, 0x1, r2}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x40004) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001780)={&(0x7f00000005c0)={0x1198, 0xa, 0x9, 0x101, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x5}, [@nested={0x10ef, 0x64, 0x0, 0x1, [@typed={0x8, 0x34, 0x0, 0x0, @fd=r1}, @generic="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", @generic="d320e6f892bce77232116ed089af77a7cd52bebe2a7111520d07959ca1e5f8d8cdc1573964798fd6ee416db7fba75fca9885b7b2b771e31663f231f61acff342039db0b57c72a7221738c750e9c8137e7bdbe0dd59c89c2a2e46b9f911f268dd273d34243d3aa454afe1d86d68e4ac24b3adb2225170518f10211784fa49298d300814624a6d38e129f2234ef8d20a1b64f9caffbc51a84f7a49ef1332c4decc10a97171238c911ec96b431ebf946cfa016d3d19be8ffc6dc36ac610f444a88dcf305d0c1fe9ca483a16f94882ad370b9139f0abd8f6edd8f7ac482a2dfbf3eec17a59"]}, @generic="cfab47d9b38302abb57c13df", @typed={0x88, 0x59, 0x0, 0x0, @binary="460697a9a39b1b18f32115b5a7e994344d1bd04e8db18e5bf74702dfee6b35267d1bd105fcee6b3d317c2e1e927e5411b333a2409208a55278192ed7caa00a7b595c012137d28dd7d064741929ae341dac6bbdbb41a64c3dcd047118355d68eec3b63a642d90effb4648af54d3e57302475c72f67840271c9f15526a1549fe8679ea05ba"}]}, 0x1198}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000001800)) 19:10:26 executing program 5: r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001c00)) r1 = accept4$packet(r0, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14, 0x80000) r3 = dup3(r1, r1, 0x0) bind$packet(r3, &(0x7f0000001cc0)={0x11, 0x7, r2, 0x1, 0x4}, 0x14) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000001d00)={0xe9f, 0x0, 0x4, 0x5, 0x2}, 0xc) fsync(r3) dup3(r0, r0, 0x80000) pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000001d80), &(0x7f0000001dc0)='./file0\x00', 0x8, 0x2) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001e00), 0x208000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r6, 0xc058671e, &(0x7f00000021c0)={{'\x00', 0x1}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)="55bb64507842730c74a24dce6653b7bdf20a95da24c77e1972445aa2d6eaa88899d09c682eb9af7a77a462403f996bf4da7babb63cf71c59ee65baa1548747c3538cc65c11e34719b42b0d92149b8d897800a155c15adee575c9cd147ab6495d4966ce925fe2ff9a8a12565097ebc42530bb8f485fb55a6bc9bf9aa629531ef63fc3266304150fe3578df9bb26ded97655b86337a0c9cb3e367e43202bd6b09f13d1199db7ac74c7a631c738f94ff32f5b901a96d0c4b5ea83bf9b5b86db49a5", 0xc0, 0x0, &(0x7f0000001f80)={0x2, 0xfb, {0x1, 0xc, 0x1a, "2f9a33ab93380f810016e12510059f02c96f73d4c0ed24551ec6", 0xd4, "f32880ae5dd7c1202f8d0658b3fbc8087458c4bb68541b1b70c1cd534e3043857453759bfadec16bbea3d3a66758b8771c7ab0c39e196c9f32c493cf98119d279b871fc67ae82b8697accb1a6301f2efa4ec756145dc4b03075c4f91092aa6418da0aa9365118060df5657cb87201261e793cfa97f8d08b1f80e88630d56ec784f6e8b88247744a7db9bb603b69c698c52ae6826700edaa13eb0125355059920f9981e1c011fbb94e990705c0adce4dae5db5de0e384f832bcdd9397208fba80d98f54e8cdd2ce9e0117b785d2436e6c1a7e79ba"}, 0xfb, "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"}, 0x202}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r5, 0x89f5, &(0x7f0000002580)={'ip6tnl0\x00', &(0x7f0000002500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x20, 0x5, 0x20, @mcast2, @private0, 0x700, 0x8, 0x328}}) 19:10:26 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r7, 0xf503, 0x0) 19:10:26 executing program 3: r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001c00)) r1 = accept4$packet(r0, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14, 0x80000) r3 = dup3(r1, r1, 0x0) bind$packet(r3, &(0x7f0000001cc0)={0x11, 0x7, r2, 0x1, 0x4}, 0x14) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000001d00)={0xe9f, 0x0, 0x4, 0x5, 0x2}, 0xc) fsync(r3) dup3(r0, r0, 0x80000) pipe(&(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000001d80), &(0x7f0000001dc0)='./file0\x00', 0x8, 0x2) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001e00), 0x208000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r6, 0xc058671e, &(0x7f00000021c0)={{'\x00', 0x1}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)="55bb64507842730c74a24dce6653b7bdf20a95da24c77e1972445aa2d6eaa88899d09c682eb9af7a77a462403f996bf4da7babb63cf71c59ee65baa1548747c3538cc65c11e34719b42b0d92149b8d897800a155c15adee575c9cd147ab6495d4966ce925fe2ff9a8a12565097ebc42530bb8f485fb55a6bc9bf9aa629531ef63fc3266304150fe3578df9bb26ded97655b86337a0c9cb3e367e43202bd6b09f13d1199db7ac74c7a631c738f94ff32f5b901a96d0c4b5ea83bf9b5b86db49a5", 0xc0, 0x0, &(0x7f0000001f80)={0x2, 0xfb, {0x1, 0xc, 0x1a, "2f9a33ab93380f810016e12510059f02c96f73d4c0ed24551ec6", 0xd4, "f32880ae5dd7c1202f8d0658b3fbc8087458c4bb68541b1b70c1cd534e3043857453759bfadec16bbea3d3a66758b8771c7ab0c39e196c9f32c493cf98119d279b871fc67ae82b8697accb1a6301f2efa4ec756145dc4b03075c4f91092aa6418da0aa9365118060df5657cb87201261e793cfa97f8d08b1f80e88630d56ec784f6e8b88247744a7db9bb603b69c698c52ae6826700edaa13eb0125355059920f9981e1c011fbb94e990705c0adce4dae5db5de0e384f832bcdd9397208fba80d98f54e8cdd2ce9e0117b785d2436e6c1a7e79ba"}, 0xfb, "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"}, 0x202}) pipe(&(0x7f0000002240)) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r5, 0x89f5, &(0x7f0000002580)={'ip6tnl0\x00', &(0x7f0000002500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x20, 0x5, 0x20, @mcast2, @private0, 0x700, 0x8, 0x328}}) 19:10:27 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:27 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:27 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 19:10:27 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getpeername$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c) 19:10:39 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) 19:10:39 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget$private(0x0, 0x200) 19:10:39 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) msgget$private(0x0, 0x200) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000480)=0x6, 0x4) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000340)={'mangle\x00', 0xc4, "036bc196f88b4de3ce5df77d30374ba66cd6a509a6ecd7bfdd6d5913b8b210dd1380ca7c1d91a9bd872128efb54b5b11fa2f872b47dee6b1121be51c6e9d5d7666e759d48c580cddda60767c012acfd901c6318e2f7caabfdf8c4b0c6fd83a8aaf40d8d59656f0d46ce824a9c5119af5b82828d46dc59b2202b95a90abb586548848f7c3d61e1d3719f49cf27c5a09d56c09789d8577eee016874857d25dfaf1570a885ba51846e1673a0272f6101e7659428b1ed3f7ecf2f82b093eddf75b92d91c8812"}, &(0x7f0000000440)=0xe8) 19:10:39 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup3(r0, r2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000300)=0x400, 0x4) 19:10:39 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:10:39 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:39 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x5) 19:10:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget$private(0x0, 0x200) 19:10:51 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) msgget$private(0x0, 0x200) 19:10:51 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) 19:10:51 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) 19:10:51 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 19:10:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:10:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 19:10:51 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) 19:10:51 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) 19:10:51 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) 19:10:51 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) 19:10:51 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) 19:10:51 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) 19:10:51 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:10:51 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:11:03 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = msgget(0x0, 0x48) msgsnd(r0, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) 19:11:03 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) 19:11:03 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) 19:11:03 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) msgget$private(0x0, 0x200) 19:11:03 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget(0x1, 0x2c2) msgget$private(0x0, 0x200) 19:11:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget$private(0x0, 0x200) 19:11:03 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:03 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)) 19:11:03 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) syz_open_procfs$userns(0x0, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:04 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget$private(0x0, 0x200) 19:11:04 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)) 19:11:04 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) msgget$private(0x0, 0x200) 19:11:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) msgget$private(0x0, 0x200) 19:11:26 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) 19:11:26 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:26 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) 19:11:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:11:26 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) 19:11:26 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:27 executing program 0: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:27 executing program 6: msgget(0x0, 0x48) 19:11:27 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) 19:11:27 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) 19:11:27 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:27 executing program 6: msgget(0x0, 0x0) 19:11:27 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:27 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x24001, 0x0) 19:11:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) msgget$private(0x0, 0x200) 19:11:41 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:41 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) 19:11:41 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:11:41 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) tkill(0x0, 0x5) 19:11:41 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x24001, 0x0) 19:11:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:11:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgget$private(0x0, 0x200) 19:11:41 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) 19:11:41 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) 19:11:42 executing program 0: openat$autofs(0xffffffffffffff9c, 0x0, 0x24001, 0x0) 19:11:42 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:11:42 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="0722ae29587d0085753604049bd58d87", 0x10) 19:11:42 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 19:11:42 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) tkill(0x0, 0x5) 19:11:42 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x24001, 0x0) 19:11:56 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 19:11:56 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = msgget(0x0, 0x48) msgsnd(r0, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) msgget$private(0x0, 0x200) 19:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:11:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgget$private(0x0, 0x200) 19:11:56 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r2, 0x0) 19:11:56 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) pidfd_getfd(r3, r5, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:11:56 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) pidfd_getfd(r3, r5, 0x0) tkill(0x0, 0x5) 19:11:56 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 19:11:56 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) 19:11:56 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) tkill(0x0, 0x5) 19:11:56 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) tkill(0x0, 0x5) 19:11:56 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:11:56 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000, {r1}}, 0x20) 19:11:56 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:11:56 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) 19:11:56 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000}, 0x20) 19:11:56 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) msgget$private(0x0, 0x200) 19:12:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = msgget(0x0, 0x48) msgsnd(r0, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:07 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) tkill(0x0, 0x5) 19:12:07 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) mount_setattr(r0, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000}, 0x20) 19:12:07 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:07 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:07 executing program 6: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) mount_setattr(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000}, 0x20) 19:12:07 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:07 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = msgget(0x0, 0x48) msgsnd(r0, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) msgget$private(0x0, 0x200) 19:12:08 executing program 6: mount_setattr(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000}, 0x20) 19:12:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) msgget$private(0x0, 0x200) 19:12:08 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:08 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:08 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x100, 0x72, 0x140000}, 0x20) 19:12:08 executing program 1: msgget$private(0x0, 0x200) 19:12:08 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) tkill(0x0, 0x5) 19:12:08 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 1: msgget$private(0x0, 0x0) 19:12:19 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:19 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:19 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r1 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:19 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) tkill(0x0, 0x5) 19:12:19 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) msgget$private(0x0, 0x200) 19:12:19 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:19 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) msgget$private(0x0, 0x200) 19:12:19 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) 19:12:19 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:19 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:19 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:19 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r1 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) tkill(0x0, 0x5) 19:12:19 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) memfd_secret(0x80000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:31 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x72, 0x140000}, 0x20) 19:12:31 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:31 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:31 executing program 7: msgget$private(0x0, 0x200) 19:12:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:31 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:31 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) memfd_secret(0x80000) tkill(0x0, 0x5) 19:12:31 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) 19:12:31 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x140000}, 0x20) 19:12:31 executing program 7: msgget$private(0x0, 0x0) 19:12:31 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:31 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:31 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) 19:12:31 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:31 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) tkill(0x0, 0x5) 19:12:31 executing program 7: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:31 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:12:31 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:12:43 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:12:43 executing program 7: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:43 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) 19:12:43 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 19:12:43 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:43 executing program 3: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)) tkill(0x0, 0x5) 19:12:43 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) 19:12:43 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(0x0, r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:43 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:12:43 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 19:12:43 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) 19:12:43 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:12:43 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x10000, 0x0) 19:12:43 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(0x0, r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:12:43 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)) 19:12:57 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(0x0, r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:57 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) 19:12:57 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) 19:12:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:12:57 executing program 6: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(0x0, r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:12:57 executing program 3: tkill(0x0, 0x5) 19:12:57 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 19:12:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:13:08 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 19:13:08 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) 19:13:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:13:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:13:08 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:13:08 executing program 3: tkill(0x0, 0x0) 19:13:08 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:08 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) 19:13:08 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 19:13:09 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(0x0, r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:09 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) 19:13:09 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:13:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), 0x4) 19:13:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 19:13:09 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:13:09 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:09 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x20) 19:13:09 executing program 5: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) r8 = pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r8, 0x40182103, &(0x7f00000005c0)={r9, 0x1, r3, 0x3}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000600)=@req3={0x7, 0x7, 0x10000, 0x1, 0x3, 0x43, 0x7}, 0x1c) getpeername$packet(r4, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000006c0)={0x1ff, 0x78, 0x3f}) prlimit64(r10, 0x0, &(0x7f0000000700)={0x100000000, 0x8}, &(0x7f0000000740)) 19:13:09 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:13:09 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:21 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:21 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) 19:13:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:13:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 7: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:21 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000540)) 19:13:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 7: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 6: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:13:21 executing program 7: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) pidfd_getfd(r2, r0, 0x0) 19:13:21 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:21 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) 19:13:21 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:32 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:32 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) tkill(0x0, 0x5) 19:13:32 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) 19:13:32 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:13:32 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:33 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:13:45 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:13:45 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:45 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:13:45 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) 19:13:45 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) 19:13:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) 19:13:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:13:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) memfd_secret(0x0) 19:13:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) 19:13:45 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000004c0)=0xa59, 0xffffffffffffffff, &(0x7f0000000540)=0x8, 0x1, 0x0) 19:13:45 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) r7 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) copy_file_range(r5, 0x0, r7, &(0x7f00000004c0)=0x4, 0x7ff, 0x0) 19:13:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) 19:13:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) 19:13:45 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:13:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) memfd_secret(0x0) 19:13:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:13:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:13:59 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, 0x0, 0x8810) 19:13:59 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r6 = pidfd_getfd(r3, r5, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r6, 0x5) 19:13:59 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r1 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:59 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) pidfd_getfd(r1, r0, 0x0) 19:13:59 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) r6 = memfd_secret(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000480)) 19:13:59 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) memfd_secret(0x0) 19:13:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:13:59 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) memfd_secret(0x80000) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:13:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) 19:14:00 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, 0x0, 0x8810) 19:14:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:00 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) r4 = pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) getpeername$inet6(r4, &(0x7f0000000400)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000440)=0x1c) 19:14:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:14:12 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") 19:14:12 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) pidfd_getfd(r3, r5, 0x0) 19:14:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) 19:14:12 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, 0x0, 0x8810) 19:14:12 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev={0xfe, 0x80, '\x00', 0x19}, 0x4e23, 0x101, 0x4e21, 0x4, 0x2, 0xa0, 0x20, 0x67, 0x0, 0xee01}, {0x7, 0x8, 0x7d83a86e, 0x38af, 0x8, 0x949e, 0x4, 0x8}, {0x20, 0x7, 0x46b96be9}, 0x8, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d2, 0x33}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x0, 0x3f, 0x7, 0x7ff, 0x80000000}}, 0xe8) 19:14:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:12 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:12 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:12 executing program 0: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:14:12 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:14:26 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000380)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) openat$cgroup_procs(r4, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:14:26 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:14:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) 19:14:26 executing program 0: perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:26 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:27 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) 19:14:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 19:14:27 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) 19:14:27 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r1, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r2 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) 19:14:27 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:40 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) 19:14:40 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:14:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") 19:14:40 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) r1 = memfd_secret(0x80000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) 19:14:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:40 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:40 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 19:14:40 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 19:14:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:40 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) memfd_secret(0x80000) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:40 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x7, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:40 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) 19:14:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:14:40 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:53 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) 19:14:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:14:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:14:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x90, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:53 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, &(0x7f0000000040)=0x7, 0xffffffffffffffff, &(0x7f0000000080)=0x6, 0x4, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:53 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:14:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:14:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x81, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:14:53 executing program 1: socketpair(0x1e, 0x6, 0x4, &(0x7f0000000000)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:14:53 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 19:14:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:14:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) 19:14:53 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) 19:15:05 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) 19:15:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) 19:15:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:15:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:05 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) 19:15:05 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:05 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:05 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) 19:15:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:05 executing program 3: pidfd_open(0x0, 0x0) 19:15:05 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) 19:15:05 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 19:15:06 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:06 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) 19:15:06 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:06 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:06 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:19 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 19:15:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:15:19 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:19 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x688, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:19 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) 19:15:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) 19:15:19 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 19:15:19 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 19:15:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:19 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 19:15:19 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:19 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) 19:15:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:15:36 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) 19:15:36 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:15:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:36 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:36 executing program 6: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, 0x0, 0x8810) 19:15:36 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:15:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) pidfd_getfd(r3, r0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:15:36 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:36 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:36 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:15:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:15:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsync(r3) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:15:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:15:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:49 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = pidfd_open(0x0, 0x0) pidfd_getfd(r3, r2, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x2) 19:15:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) pidfd_open(0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:15:49 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:15:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x2) 19:16:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x2) 19:16:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:16:01 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:01 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:16:01 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:16:01 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:01 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0xc4, 0x9, 0x1}, {0xfff8, 0x40, 0x9, 0x20ce}, {0x5, 0x7, 0x5, 0x26d}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:01 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") socket$inet6(0xa, 0x6, 0xf8ea) 19:16:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") 19:16:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:16 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) r1 = pidfd_open(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r1, 0xad14}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:16:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgget(0x1, 0x2c2) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) pidfd_open(0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:16 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) syz_usb_ep_write(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000002b80)="4069f560d8b1a5ab383d59b97789e7301c8ba5") 19:16:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:29 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:16:29 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:29 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:29 executing program 1: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:29 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:29 executing program 1: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) 19:16:29 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:29 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:29 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:29 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:44 executing program 1: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) 19:16:44 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) r6 = socket$inet6(0xa, 0x6, 0x9) recvmsg(r6, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:44 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:44 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:44 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:16:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) [ 2302.899040] audit: type=1400 audit(1663615004.235:9): avc: denied { kernel } for pid=12836 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 19:16:44 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:44 executing program 1: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:16:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:44 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) 19:16:57 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) socket$inet6(0xa, 0x6, 0x9) 19:16:57 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:57 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:57 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:16:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:16:57 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:57 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) 19:16:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) 19:16:57 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:16:57 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:16:57 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) 19:17:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) r5 = msgget$private(0x0, 0x200) msgsnd(r5, &(0x7f0000000500)={0x3, "52523bb9f650263b69e6b5a23972ce35a186d79dcbee6de64c80041b268f8424967647bfe2231b12c9febe9e3127d59a2aac862024c0c7c94ce1805fe018553681cc3bda2dbc5a7d028c0f683965f2a21cd75947cabd92de5d486cd19e92b73b10b53065f6f47ddc43e7611c1f30c244ec7ef86cbf2b36ec72a4c78dc6fa4098035b28ae541323594854361d5dbc743fd15a1810e6d5f712a42727694158948fbe04"}, 0xaa, 0x800) 19:17:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) 19:17:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x0, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) 19:17:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x0, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:24 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) msgget$private(0x0, 0x200) 19:17:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x182a0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:24 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x0, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:25 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:39 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:17:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = msgget(0x0, 0x48) msgsnd(r0, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:40 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:40 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:40 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 19:17:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:17:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:17:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:17:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:53 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x0, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = msgget(0x1, 0x2c2) msgrcv(r2, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:17:53 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:17:53 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:53 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000005c0)=@nl=@unspec, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/135, 0x87}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/193, 0xc1}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002a40)=""/220, 0xdc}, 0x12162) 19:17:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:17:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 19:18:05 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:18:05 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:18:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x40008f5) 19:18:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) msgget(0x0, 0x300) r3 = msgget(0x1, 0x2c2) msgrcv(r3, &(0x7f0000000180)={0x0, ""/205}, 0xd5, 0x2, 0x3000) syz_usb_ep_write(0xffffffffffffffff, 0x6, 0x18, &(0x7f00000003c0)="0a0ced238c985c00f92b28b0ce2129e5a136e54d699e1b29") 19:18:05 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x12162) 19:18:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) r2 = msgget(0x1, 0x2c2) msgrcv(r2, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:18:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = msgget(0x0, 0x48) msgsnd(r1, &(0x7f0000000000)={0x1, "f2c0fa8398f941e8e2fa898c94100c2012738c605592fbbfbb9a282bc3b4d097aaf37db414ae61d08f163ab4587e3903c1f355fb2772f658f83e2ac948a1c7fcccd7db1244e140e674b43b17fc6237148118a021b6807bfc5ba22e7bb4ccabfc7004a66342223588030c179e0ffad232d17674530336d654"}, 0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/111) socket$inet6_tcp(0xa, 0x1, 0x0) msgrcv(0x0, &(0x7f0000000400)={0x0, ""/204}, 0xd4, 0x1, 0x2800) 19:18:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) 19:18:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) 19:18:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2384.784778] ------------[ cut here ]------------ [ 2384.785318] WARNING: CPU: 0 PID: 13146 at kernel/events/core.c:2047 perf_group_detach+0x99e/0x12f0 [ 2384.785990] Modules linked in: [ 2384.786234] CPU: 0 PID: 13146 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220919 #1 [ 2384.786845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2384.787695] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 2384.788084] Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 46 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 1b b5 aa 7e 31 ff 89 [ 2384.789422] RSP: 0018:ffff88806ce09e60 EFLAGS: 00010046 [ 2384.789819] RAX: 0000000080010002 RBX: ffff888008660b90 RCX: 0000000000000000 [ 2384.790338] RDX: ffff888028fb8000 RSI: ffffffff8157c08e RDI: 0000000000000005 [ 2384.790864] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 2384.791409] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 2384.791941] R13: ffff888008660c20 R14: ffff88806ce3ef00 R15: ffff888008660b90 [ 2384.792475] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2384.793081] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2384.793519] CR2: 00007f076d0c7018 CR3: 000000000d200000 CR4: 0000000000350ef0 [ 2384.794060] Call Trace: [ 2384.794263] [ 2384.794439] ? event_sched_out+0x71c/0xcd0 [ 2384.794774] __perf_remove_from_context+0x71e/0xb20 [ 2384.795178] event_function+0x297/0x3d0 [ 2384.795507] ? perf_output_read+0xf80/0xf80 [ 2384.795968] remote_function+0x125/0x1b0 [ 2384.796639] __flush_smp_call_function_queue+0x1df/0x5a0 [ 2384.797357] ? perf_duration_warn+0x40/0x40 [ 2384.797689] __sysvec_call_function_single+0x92/0x3a0 [ 2384.798079] sysvec_call_function_single+0x89/0xc0 [ 2384.798447] [ 2384.798621] [ 2384.798797] asm_sysvec_call_function_single+0x16/0x20 [ 2384.799201] RIP: 0010:lock_acquire+0x1db/0x530 [ 2384.799551] Code: 02 b8 ff ff ff ff 65 0f c1 05 01 37 d8 7e 83 f8 01 0f 85 c8 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 2384.800868] RSP: 0018:ffff888038ddf4d0 EFLAGS: 00000206 [ 2384.801263] RAX: dffffc0000000000 RBX: 1ffff110071bbe9c RCX: 00000000f72c9ecb [ 2384.801799] RDX: 1ffff110051f712e RSI: 0000000000000001 RDI: 0000000000000000 [ 2384.802341] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff86ccb7c7 [ 2384.802885] R10: fffffbfff0d996f8 R11: 0000000000000001 R12: 0000000000000002 [ 2384.803450] R13: 0000000000000000 R14: ffffffff85406f60 R15: 0000000000000000 [ 2384.804007] ? lock_release+0x750/0x750 [ 2384.804322] ? lock_is_held_type+0xd7/0x130 [ 2384.804657] ? find_held_lock+0x2c/0x110 [ 2384.804980] ? lock_release+0x3b2/0x750 [ 2384.805289] ? unlock_page_memcg+0xbe/0x230 [ 2384.805631] ? lock_downgrade+0x6d0/0x6d0 [ 2384.805963] folio_memcg_lock+0x3a/0x4a0 [ 2384.806292] ? mem_cgroup_get_oom_group+0x3a0/0x3a0 [ 2384.806677] ? __pte_alloc_kernel+0x1c0/0x1c0 [ 2384.807048] page_remove_rmap+0x1e/0x490 [ 2384.807373] unmap_page_range+0x1c26/0x2a10 [ 2384.807727] ? vm_normal_page+0x2e0/0x2e0 [ 2384.808055] ? mas_find+0x209/0xdd0 [ 2384.808345] ? uprobe_munmap+0x1c/0x560 [ 2384.808663] unmap_single_vma+0x190/0x380 [ 2384.808994] unmap_vmas+0x21e/0x370 [ 2384.809284] ? unmap_mapping_range+0x280/0x280 [ 2384.809641] ? find_held_lock+0x2c/0x110 [ 2384.809961] ? lock_downgrade+0x6d0/0x6d0 [ 2384.810312] exit_mmap+0x154/0x680 [ 2384.810600] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 2384.811031] ? delayed_uprobe_remove+0x27/0x230 [ 2384.811405] mmput+0xd1/0x390 [ 2384.811661] do_exit+0xa2e/0x27f0 [ 2384.811938] ? lock_release+0x3b2/0x750 [ 2384.812253] ? get_signal+0x88b/0x22d0 [ 2384.812558] ? mm_update_next_owner+0x7e0/0x7e0 [ 2384.812929] ? lock_is_held_type+0xd7/0x130 [ 2384.813272] do_group_exit+0xd0/0x2a0 [ 2384.813568] get_signal+0x219a/0x22d0 [ 2384.813876] ? exit_signals+0x8b0/0x8b0 [ 2384.814184] ? lock_downgrade+0x6d0/0x6d0 [ 2384.814518] arch_do_signal_or_restart+0x89/0x1be0 [ 2384.814899] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.815295] ? lockdep_hardirqs_on+0x79/0x100 [ 2384.815642] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.816035] ? __switch_to+0x5bf/0xf20 [ 2384.816330] ? get_sigframe_size+0x10/0x10 [ 2384.816648] ? __schedule+0x89b/0x2470 [ 2384.816957] ? io_schedule_timeout+0x150/0x150 [ 2384.817313] ? __x64_sys_futex_time32+0x480/0x480 [ 2384.817679] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 2384.818077] exit_to_user_mode_prepare+0x131/0x1a0 [ 2384.818462] syscall_exit_to_user_mode+0x19/0x40 [ 2384.818827] do_syscall_64+0x48/0x90 [ 2384.819125] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2384.819525] RIP: 0033:0x7fb0016b6b19 [ 2384.819806] Code: Unable to access opcode bytes at RIP 0x7fb0016b6aef. [ 2384.820287] RSP: 002b:00007faffec2c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2384.820859] RAX: 0000000000000001 RBX: 00007fb0017c9f68 RCX: 00007fb0016b6b19 [ 2384.821399] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fb0017c9f6c [ 2384.821936] RBP: 00007fb0017c9f60 R08: 000000000000000e R09: 0000000000000000 [ 2384.822475] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fb0017c9f6c [ 2384.823032] R13: 00007fffb29aeb3f R14: 00007faffec2c300 R15: 0000000000022000 [ 2384.823581] [ 2384.823761] irq event stamp: 216 [ 2384.824022] hardirqs last enabled at (215): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 2384.824721] hardirqs last disabled at (216): [] sysvec_call_function_single+0xb/0xc0 [ 2384.825417] softirqs last enabled at (208): [] __irq_exit_rcu+0x11b/0x180 [ 2384.826055] softirqs last disabled at (203): [] __irq_exit_rcu+0x11b/0x180 [ 2384.826683] ---[ end trace 0000000000000000 ]--- [ 2384.827079] ------------[ cut here ]------------ [ 2384.827433] WARNING: CPU: 0 PID: 13146 at kernel/events/core.c:2183 perf_group_detach+0x9c7/0x12f0 [ 2384.828101] Modules linked in: [ 2384.828354] CPU: 0 PID: 13146 Comm: syz-executor.0 Tainted: G W 6.0.0-rc6-next-20220919 #1 [ 2384.829077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2384.829925] RIP: 0010:perf_group_detach+0x9c7/0x12f0 [ 2384.830311] Code: ff 0f 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 1b b5 aa 7e 31 ff 89 de e8 96 53 ee ff 85 db 0f 84 86 04 00 00 e8 d9 56 ee ff <0f> 0b e9 0e fa ff ff e8 cd 56 ee ff 48 8b 7c 24 20 48 81 c7 f8 00 [ 2384.831680] RSP: 0018:ffff88806ce09e60 EFLAGS: 00010046 [ 2384.832075] RAX: 0000000080010002 RBX: 0000000000000000 RCX: 0000000000000000 [ 2384.832608] RDX: ffff888028fb8000 RSI: ffffffff8157c0b7 RDI: 0000000000000005 [ 2384.833156] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 2384.833681] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888008660b90 [ 2384.834229] R13: ffff888008660b90 R14: ffff88806ce3ef00 R15: ffff888008660b90 [ 2384.834755] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2384.835361] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2384.835792] CR2: 00007f076d0c7018 CR3: 000000000d200000 CR4: 0000000000350ef0 [ 2384.836324] Call Trace: [ 2384.836524] [ 2384.836691] ? event_sched_out+0x71c/0xcd0 [ 2384.837033] __perf_remove_from_context+0x71e/0xb20 [ 2384.837425] event_function+0x297/0x3d0 [ 2384.837734] ? perf_output_read+0xf80/0xf80 [ 2384.838074] remote_function+0x125/0x1b0 [ 2384.838382] __flush_smp_call_function_queue+0x1df/0x5a0 [ 2384.838802] ? perf_duration_warn+0x40/0x40 [ 2384.839142] __sysvec_call_function_single+0x92/0x3a0 [ 2384.839544] sysvec_call_function_single+0x89/0xc0 [ 2384.839922] [ 2384.840100] [ 2384.840278] asm_sysvec_call_function_single+0x16/0x20 [ 2384.840677] RIP: 0010:lock_acquire+0x1db/0x530 [ 2384.841027] Code: 02 b8 ff ff ff ff 65 0f c1 05 01 37 d8 7e 83 f8 01 0f 85 c8 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 2384.842380] RSP: 0018:ffff888038ddf4d0 EFLAGS: 00000206 [ 2384.842786] RAX: dffffc0000000000 RBX: 1ffff110071bbe9c RCX: 00000000f72c9ecb [ 2384.843798] RDX: 1ffff110051f712e RSI: 0000000000000001 RDI: 0000000000000000 [ 2384.844928] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff86ccb7c7 [ 2384.846048] R10: fffffbfff0d996f8 R11: 0000000000000001 R12: 0000000000000002 [ 2384.847208] R13: 0000000000000000 R14: ffffffff85406f60 R15: 0000000000000000 [ 2384.848301] ? lock_release+0x750/0x750 [ 2384.848866] ? lock_is_held_type+0xd7/0x130 [ 2384.849479] ? find_held_lock+0x2c/0x110 [ 2384.850059] ? lock_release+0x3b2/0x750 [ 2384.850617] ? unlock_page_memcg+0xbe/0x230 [ 2384.851236] ? lock_downgrade+0x6d0/0x6d0 [ 2384.851836] folio_memcg_lock+0x3a/0x4a0 [ 2384.852410] ? mem_cgroup_get_oom_group+0x3a0/0x3a0 [ 2384.853101] ? __pte_alloc_kernel+0x1c0/0x1c0 [ 2384.853754] page_remove_rmap+0x1e/0x490 [ 2384.854338] unmap_page_range+0x1c26/0x2a10 [ 2384.855001] ? vm_normal_page+0x2e0/0x2e0 [ 2384.855599] ? mas_find+0x209/0xdd0 [ 2384.856127] ? uprobe_munmap+0x1c/0x560 [ 2384.856697] unmap_single_vma+0x190/0x380 [ 2384.857304] unmap_vmas+0x21e/0x370 [ 2384.857837] ? unmap_mapping_range+0x280/0x280 [ 2384.858485] ? find_held_lock+0x2c/0x110 [ 2384.859083] ? lock_downgrade+0x6d0/0x6d0 [ 2384.859700] exit_mmap+0x154/0x680 [ 2384.860211] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 2384.860963] ? delayed_uprobe_remove+0x27/0x230 [ 2384.861627] mmput+0xd1/0x390 [ 2384.862093] do_exit+0xa2e/0x27f0 [ 2384.862611] ? lock_release+0x3b2/0x750 [ 2384.863190] ? get_signal+0x88b/0x22d0 [ 2384.863757] ? mm_update_next_owner+0x7e0/0x7e0 [ 2384.864424] ? lock_is_held_type+0xd7/0x130 [ 2384.865045] do_group_exit+0xd0/0x2a0 [ 2384.865585] get_signal+0x219a/0x22d0 [ 2384.866154] ? exit_signals+0x8b0/0x8b0 [ 2384.866714] ? lock_downgrade+0x6d0/0x6d0 [ 2384.867323] arch_do_signal_or_restart+0x89/0x1be0 [ 2384.867999] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.868711] ? lockdep_hardirqs_on+0x79/0x100 [ 2384.869350] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.870067] ? __switch_to+0x5bf/0xf20 [ 2384.870622] ? get_sigframe_size+0x10/0x10 [ 2384.871234] ? __schedule+0x89b/0x2470 [ 2384.871791] ? io_schedule_timeout+0x150/0x150 [ 2384.872443] ? __x64_sys_futex_time32+0x480/0x480 [ 2384.873114] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 2384.873825] exit_to_user_mode_prepare+0x131/0x1a0 [ 2384.874519] syscall_exit_to_user_mode+0x19/0x40 [ 2384.875197] do_syscall_64+0x48/0x90 [ 2384.875726] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2384.876456] RIP: 0033:0x7fb0016b6b19 [ 2384.876990] Code: Unable to access opcode bytes at RIP 0x7fb0016b6aef. [ 2384.877872] RSP: 002b:00007faffec2c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2384.878924] RAX: 0000000000000001 RBX: 00007fb0017c9f68 RCX: 00007fb0016b6b19 [ 2384.879926] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fb0017c9f6c [ 2384.880892] RBP: 00007fb0017c9f60 R08: 000000000000000e R09: 0000000000000000 [ 2384.881874] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fb0017c9f6c [ 2384.882851] R13: 00007fffb29aeb3f R14: 00007faffec2c300 R15: 0000000000022000 [ 2384.883882] [ 2384.884227] irq event stamp: 216 [ 2384.884686] hardirqs last enabled at (215): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 2384.885951] hardirqs last disabled at (216): [] sysvec_call_function_single+0xb/0xc0 [ 2384.887243] softirqs last enabled at (208): [] __irq_exit_rcu+0x11b/0x180 [ 2384.888407] softirqs last disabled at (203): [] __irq_exit_rcu+0x11b/0x180 [ 2384.889580] ---[ end trace 0000000000000000 ]--- [ 2384.890399] ------------[ cut here ]------------ [ 2384.891051] WARNING: CPU: 0 PID: 13146 at kernel/events/core.c:655 perf_event_update_sibling_time+0xd5/0x4d0 [ 2384.892394] Modules linked in: [ 2384.892845] CPU: 0 PID: 13146 Comm: syz-executor.0 Tainted: G W 6.0.0-rc6-next-20220919 #1 [ 2384.894135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2384.895649] RIP: 0010:perf_event_update_sibling_time+0xd5/0x4d0 [ 2384.896491] Code: 5e 41 5f e9 5d c5 f0 ff e8 58 c5 f0 ff 65 8b 1d 7d 23 ad 7e 31 ff 89 de e8 f8 c1 f0 ff 85 db 0f 84 d3 02 00 00 e8 3b c5 f0 ff <0f> 0b eb 97 e8 32 c5 f0 ff 48 8d 7d 10 48 b8 00 00 00 00 00 fc ff [ 2384.898949] RSP: 0018:ffff88806ce09e58 EFLAGS: 00010046 [ 2384.899693] RAX: 0000000080010002 RBX: 0000000000000000 RCX: 0000000000000000 [ 2384.900675] RDX: ffff888028fb8000 RSI: ffffffff81555255 RDI: 0000000000000005 [ 2384.901652] RBP: ffff888008660b90 R08: 0000000000000005 R09: 0000000000000001 [ 2384.902624] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 2384.903606] R13: ffff888008660c38 R14: 0000000000000001 R15: 0000000000000001 [ 2384.904591] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2384.905678] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2384.906479] CR2: 00007f076d0c7018 CR3: 000000000d200000 CR4: 0000000000350ef0 [ 2384.907460] Call Trace: [ 2384.907829] [ 2384.908145] ? lock_is_held_type+0xd7/0x130 [ 2384.908754] ? perf_event_update_time+0x285/0x380 [ 2384.909445] list_del_event+0x524/0x860 [ 2384.910022] __perf_remove_from_context+0xd2/0xb20 [ 2384.910723] event_function+0x297/0x3d0 [ 2384.911298] ? perf_output_read+0xf80/0xf80 [ 2384.911918] remote_function+0x125/0x1b0 [ 2384.912503] __flush_smp_call_function_queue+0x1df/0x5a0 [ 2384.913244] ? perf_duration_warn+0x40/0x40 [ 2384.913857] __sysvec_call_function_single+0x92/0x3a0 [ 2384.914588] sysvec_call_function_single+0x89/0xc0 [ 2384.915287] [ 2384.915606] [ 2384.915930] asm_sysvec_call_function_single+0x16/0x20 [ 2384.916677] RIP: 0010:lock_acquire+0x1db/0x530 [ 2384.917353] Code: 02 b8 ff ff ff ff 65 0f c1 05 01 37 d8 7e 83 f8 01 0f 85 c8 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 2384.919815] RSP: 0018:ffff888038ddf4d0 EFLAGS: 00000206 [ 2384.920568] RAX: dffffc0000000000 RBX: 1ffff110071bbe9c RCX: 00000000f72c9ecb [ 2384.921563] RDX: 1ffff110051f712e RSI: 0000000000000001 RDI: 0000000000000000 [ 2384.922554] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff86ccb7c7 [ 2384.923548] R10: fffffbfff0d996f8 R11: 0000000000000001 R12: 0000000000000002 [ 2384.924545] R13: 0000000000000000 R14: ffffffff85406f60 R15: 0000000000000000 [ 2384.925576] ? lock_release+0x750/0x750 [ 2384.926155] ? lock_is_held_type+0xd7/0x130 [ 2384.926778] ? find_held_lock+0x2c/0x110 [ 2384.927390] ? lock_release+0x3b2/0x750 [ 2384.927969] ? unlock_page_memcg+0xbe/0x230 [ 2384.928592] ? lock_downgrade+0x6d0/0x6d0 [ 2384.929213] folio_memcg_lock+0x3a/0x4a0 [ 2384.929805] ? mem_cgroup_get_oom_group+0x3a0/0x3a0 [ 2384.930528] ? __pte_alloc_kernel+0x1c0/0x1c0 [ 2384.931198] page_remove_rmap+0x1e/0x490 [ 2384.931797] unmap_page_range+0x1c26/0x2a10 [ 2384.932465] ? vm_normal_page+0x2e0/0x2e0 [ 2384.933074] ? mas_find+0x209/0xdd0 [ 2384.933612] ? uprobe_munmap+0x1c/0x560 [ 2384.934196] unmap_single_vma+0x190/0x380 [ 2384.934809] unmap_vmas+0x21e/0x370 [ 2384.935352] ? unmap_mapping_range+0x280/0x280 [ 2384.936011] ? find_held_lock+0x2c/0x110 [ 2384.936600] ? lock_downgrade+0x6d0/0x6d0 [ 2384.937236] exit_mmap+0x154/0x680 [ 2384.937764] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 2384.938550] ? delayed_uprobe_remove+0x27/0x230 [ 2384.939249] mmput+0xd1/0x390 [ 2384.939724] do_exit+0xa2e/0x27f0 [ 2384.940240] ? lock_release+0x3b2/0x750 [ 2384.940818] ? get_signal+0x88b/0x22d0 [ 2384.941396] ? mm_update_next_owner+0x7e0/0x7e0 [ 2384.942071] ? lock_is_held_type+0xd7/0x130 [ 2384.942702] do_group_exit+0xd0/0x2a0 [ 2384.943256] get_signal+0x219a/0x22d0 [ 2384.943830] ? exit_signals+0x8b0/0x8b0 [ 2384.944407] ? lock_downgrade+0x6d0/0x6d0 [ 2384.944998] arch_do_signal_or_restart+0x89/0x1be0 [ 2384.945680] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.946396] ? lockdep_hardirqs_on+0x79/0x100 [ 2384.947056] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 2384.947771] ? __switch_to+0x5bf/0xf20 [ 2384.948337] ? get_sigframe_size+0x10/0x10 [ 2384.948949] ? __schedule+0x89b/0x2470 [ 2384.949517] ? io_schedule_timeout+0x150/0x150 [ 2384.950172] ? __x64_sys_futex_time32+0x480/0x480 [ 2384.950850] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 2384.951592] exit_to_user_mode_prepare+0x131/0x1a0 [ 2384.952315] syscall_exit_to_user_mode+0x19/0x40 [ 2384.952998] do_syscall_64+0x48/0x90 [ 2384.953537] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2384.954266] RIP: 0033:0x7fb0016b6b19 [ 2384.954804] Code: Unable to access opcode bytes at RIP 0x7fb0016b6aef. [ 2384.955720] RSP: 002b:00007faffec2c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2384.956770] RAX: 0000000000000001 RBX: 00007fb0017c9f68 RCX: 00007fb0016b6b19 [ 2384.957763] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fb0017c9f6c [ 2384.958759] RBP: 00007fb0017c9f60 R08: 000000000000000e R09: 0000000000000000 [ 2384.959738] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fb0017c9f6c [ 2384.960725] R13: 00007fffb29aeb3f R14: 00007faffec2c300 R15: 0000000000022000 [ 2384.961737] [ 2384.962077] irq event stamp: 216 [ 2384.962554] hardirqs last enabled at (215): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 2384.963867] hardirqs last disabled at (216): [] sysvec_call_function_single+0xb/0xc0 [ 2384.965156] softirqs last enabled at (208): [] __irq_exit_rcu+0x11b/0x180 [ 2384.966345] softirqs last disabled at (203): [] __irq_exit_rcu+0x11b/0x180 [ 2384.967538] ---[ end trace 0000000000000000 ]--- 19:18:06 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x4c, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xad}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) 19:18:06 executing program 5: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 5: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 5: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:18:06 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = msgget$private(0x0, 0x40e) msgsnd(r0, &(0x7f0000000000)={0x3, "add0084846f6ec7b5aeb55fa88d3039fea0de70885551e2438efcf76"}, 0x24, 0x0) msgctl$IPC_RMID(r0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x3, "d51cb88cd5bc28297283cc036ee37f2d39924970d89bc1a5506b3142d2f9290d4a4478f308c3f2d834ad1aa8ea67300235d9af4a9a661f395f920046457c5c02a9e287cfefbca875b9bfa11ededd5ac0ead439464004b90f81fb8b0d2318c8c4b7043d06d083e32f19658444a3eff24a3a810c32ae0fd8e1ec6269e7b64705d0430e7a882288f11daa22018b387b351ce9a48a5771f36128"}, 0xa0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r1) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000440)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r2) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000004}, 0x8810) VM DIAGNOSIS: 19:18:06 Registers: info registers vcpu 0 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b2e71 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88806ce09788 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000035 R11=0000000000000001 R12=0000000000000035 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b2e60 RIP=ffffffff822b2ec9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f076d0c7018 CR3=000000000d200000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=1ffff11006eaaf5c RCX=0000000000000000 RDX=ffff888038ded040 RSI=ffffffff813bc163 RDI=0000000000000005 RBP=ffff888037557b90 RSP=ffff888037557ac0 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000200 RIP=ffffffff813bc165 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556c02400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f076d0c3000 CR3=0000000036786000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f076d09a7c0 00007f076d09a7c8 YMM02=0000000000000000 0000000000000000 00007f076d09a7e0 00007f076d09a7c0 YMM03=0000000000000000 0000000000000000 00007f076d09a7c8 00007f076d09a7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000