0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) futex(&(0x7f0000000ac0)=0x1, 0xc, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x1, 0x2) 16:32:59 executing program 4: syz_open_dev$loop(0x0, 0x3, 0x292800) 16:33:12 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000400)) 16:33:12 executing program 4: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x292800) 16:33:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) futex(&(0x7f0000000ac0)=0x1, 0xc, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x1, 0x2) 16:33:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000003c0)={r3, 0x2, 0x1ff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x200) setsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f0000001880), 0x4) 16:33:12 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0)) setreuid(0x0, r1) 16:33:12 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) futex(&(0x7f0000000ac0)=0x1, 0xc, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x1, 0x2) 16:33:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 16:33:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) 16:33:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) 16:33:12 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) futex(&(0x7f0000000ac0)=0x1, 0xc, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x1, 0x2) 16:33:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) 16:33:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000003c0)={r3, 0x2, 0x1ff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x200) 16:33:12 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 16:33:12 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) setreuid(0x0, 0x0) 16:33:12 executing program 4: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:33:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') 16:33:12 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) 16:33:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) 16:33:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 16:33:12 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) 16:33:12 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:33:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000003c0)={r3, 0x2, 0x1ff}) 16:33:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') 16:33:13 executing program 4: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:33:13 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:33:26 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:33:26 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) setreuid(0x0, 0x0) 16:33:26 executing program 4: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:33:26 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:33:26 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:33:26 executing program 5: syz_open_procfs(0x0, 0x0) 16:33:26 executing program 1: syz_open_procfs(0x0, 0x0) 16:33:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)) 16:33:39 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:33:39 executing program 1: syz_open_procfs(0x0, 0x0) 16:33:39 executing program 5: syz_open_procfs(0x0, 0x0) 16:33:39 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:33:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:33:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) 16:33:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) setreuid(0x0, 0x0) 16:33:39 executing program 1: syz_open_procfs(0x0, 0x0) 16:33:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:33:39 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:33:39 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:33:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:33:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) 16:33:39 executing program 5: syz_open_procfs(0x0, 0x0) 16:33:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) setreuid(0x0, 0x0) 16:33:39 executing program 6: syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:33:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) 16:33:52 executing program 6: syz_open_procfs$userns(0x0, 0x0) 16:33:52 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:33:52 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:33:52 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) setreuid(0x0, 0x0) 16:33:52 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) 16:33:52 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:33:52 executing program 5: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:33:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 16:33:52 executing program 6: syz_open_procfs$userns(0x0, 0x0) 16:33:52 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:33:52 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) 16:33:52 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:33:52 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:33:52 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') 16:33:52 executing program 6: syz_open_procfs$userns(0x0, 0x0) 16:33:52 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) setreuid(0x0, 0x0) 16:33:52 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) 16:33:52 executing program 5: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:33:52 executing program 2: syz_open_procfs(0x0, 0x0) 16:34:04 executing program 5: syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) 16:34:04 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:04 executing program 0: setreuid(0x0, 0x0) 16:34:04 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:04 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:04 executing program 2: syz_open_procfs(0x0, 0x0) 16:34:04 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:04 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) setreuid(0x0, 0x0) 16:34:17 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:17 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:34:17 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:17 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) setreuid(0x0, 0x0) 16:34:17 executing program 2: syz_open_procfs(0x0, 0x0) 16:34:17 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:17 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) 16:34:17 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:18 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:34:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:34:18 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:34:18 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) 16:34:18 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:18 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) setreuid(0x0, 0x0) 16:34:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:34:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:18 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:34:18 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) 16:34:18 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:34:18 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:34:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:34:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:18 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:32 executing program 6: setreuid(0x0, 0x0) 16:34:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:32 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:32 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:34:32 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:34:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:34:32 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:34:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:34:32 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:34:32 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:34:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:34:32 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:32 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:34:32 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:44 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) semget$private(0x0, 0x4, 0x2) 16:34:44 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:34:44 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:44 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:34:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:34:44 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:34:44 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:44 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:44 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:34:44 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:57 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:57 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 3: r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:34:57 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semget$private(0x0, 0x4, 0x2) 16:34:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:34:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) 16:34:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:34:57 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:57 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semget$private(0x0, 0x4, 0x2) 16:34:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) 16:34:57 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:34:57 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:34:57 executing program 7: semget$private(0x0, 0x4, 0x2) 16:34:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:34:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:34:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) 16:34:57 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:34:57 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:10 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:35:10 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:35:10 executing program 7: semget$private(0x0, 0x0, 0x2) 16:35:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:35:10 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:35:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:10 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:35:10 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:10 executing program 7: semget$private(0x0, 0x0, 0x2) 16:35:10 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:10 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:10 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:35:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:35:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:35:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:24 executing program 7: semget$private(0x0, 0x0, 0x2) 16:35:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:24 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:35:24 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:24 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:35:24 executing program 7: semget$private(0x0, 0x4, 0x0) 16:35:24 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:35:24 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 16:35:24 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:35:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:35:24 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 16:35:24 executing program 3: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:35:36 executing program 3: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:35:36 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:35:36 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:35:36 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:35:36 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:35:36 executing program 3: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:35:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:35:36 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:35:37 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:35:37 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:35:50 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:35:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:35:50 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:35:50 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:35:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:35:50 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:35:50 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:35:50 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:05 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:36:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:36:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:36:05 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:05 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:36:05 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:36:05 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:05 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:05 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:36:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:36:05 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:36:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:36:05 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:05 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:05 executing program 3: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:18 executing program 3: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:18 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:18 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:18 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:36:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 16:36:18 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r1 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) 16:36:18 executing program 3: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:18 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:36:18 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:18 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:18 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:18 executing program 2: r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:18 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 16:36:30 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:36:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:30 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:30 executing program 1: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:30 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:30 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:30 executing program 2: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:30 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:30 executing program 2: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:30 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:30 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:36:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:30 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:30 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:30 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:30 executing program 1: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:30 executing program 2: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:43 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:43 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:43 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:43 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 16:36:43 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:43 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:43 executing program 1: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:43 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:43 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:43 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:36:43 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:36:43 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:43 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:43 executing program 4: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:43 executing program 2: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:36:54 executing program 2: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:36:54 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:54 executing program 4: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:54 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:54 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:54 executing program 7: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:54 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:36:54 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:36:54 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:36:54 executing program 7: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:54 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:36:54 executing program 4: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:36:54 executing program 2: semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:36:54 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:36:54 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:07 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:07 executing program 7: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:37:07 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:37:07 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:07 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:07 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:37:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:37:07 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:07 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:37:07 executing program 5: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:07 executing program 3: semget$private(0x0, 0x0, 0x2) 16:37:07 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:07 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:07 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:18 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:18 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:18 executing program 5: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:18 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) 16:37:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:18 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:18 executing program 3: semget$private(0x0, 0x0, 0x0) 16:37:19 executing program 7: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:37:19 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:19 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:37:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:19 executing program 3: syz_open_procfs$userns(0x0, 0x0) 16:37:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) 16:37:19 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:19 executing program 5: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:37:33 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:33 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:37:33 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) 16:37:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) 16:37:33 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:37:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:37:33 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x144, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x29, 0x5, "495ab12c5365cc749c5bf49582de95a5dbc2e9a73871a48b7791ec8d1d9e1c095f6d355b90"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}, @ETHTOOL_A_BITSET_MASK={0x100, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x44000}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x118, 0x0, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x400400d}, 0x9c96ab6cc758ad78) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000480)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x685}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {0x1f}}, './file0\x00'}) write$P9_ROPEN(r3, &(0x7f0000000580)={0x18, 0x71, 0x2, {{0x8, 0x4}, 0x7fffffff}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), r1) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x24, r5, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x48881}, 0x4000000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000740)) 16:37:33 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:37:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semget$private(0x0, 0x4, 0x2) 16:37:33 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x0, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:37:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) 16:37:47 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:37:47 executing program 1: semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 4: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:37:47 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) 16:37:47 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) syz_open_dev$loop(&(0x7f0000000700), 0x3, 0x292800) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:37:47 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 16:37:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) 16:37:47 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) 16:37:47 executing program 1: semget$private(0x0, 0x0, 0x2) 16:37:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, 0x0) semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 16:37:47 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:37:47 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:37:47 executing program 1: semget$private(0x0, 0x0, 0x2) 16:37:47 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) 16:37:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:37:47 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:01 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) 16:38:01 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) r2 = semget$private(0x0, 0x4, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x0, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7d}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x700, 0x20, 0xfffffeff, 0xea0, {{0x9, 0x4, 0x2, 0x21, 0x24, 0x67, 0x0, 0x66, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @multicast1, {[@timestamp={0x44, 0xc, 0x38, 0x0, 0x6, [0x5, 0xfff]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', r5, 0x20, 0x8000, 0x2, 0x8001, {{0x33, 0x4, 0x2, 0x1, 0xcc, 0x66, 0x0, 0x3, 0x29, 0x0, @private=0xa010101, @multicast1, {[@timestamp={0x44, 0xc, 0x90, 0x0, 0x7, [0x8000, 0x3]}, @ssrr={0x89, 0x13, 0x42, [@loopback, @multicast1, @multicast1, @remote]}, @cipso={0x86, 0x16, 0xffffffffffffffff, [{0x7, 0x10, "c5d98a48d89ce4587bb65384c2d0"}]}, @ssrr={0x89, 0x1f, 0xff, [@local, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @multicast2, @broadcast]}, @timestamp={0x44, 0x14, 0x58, 0x0, 0x0, [0x7, 0x80000000, 0x1, 0x1ff]}, @noop, @ssrr={0x89, 0x27, 0xfc, [@loopback, @private=0xa010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @multicast1, @remote, @rand_addr=0x64010101]}, @timestamp={0x44, 0x28, 0x8f, 0x0, 0x9, [0x9, 0x7, 0x1, 0xffffff00, 0x1, 0x101, 0x7fff, 0x6, 0x1ff]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000440)={'ip_vti0\x00', r6, 0x10, 0x700, 0xffffff01, 0x2, {{0x22, 0x4, 0x0, 0x3, 0x88, 0x64, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0x35, 0x1, 0x3, [{@local, 0xffffff9f}, {@rand_addr=0x64010101, 0x400}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x24, 0x3, 0x8, [{@rand_addr=0x64010100, 0xd04}, {@remote, 0x5}, {@empty}, {@empty, 0xa6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop, @lsrr={0x83, 0x23, 0x26, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @broadcast, @private=0xa010101, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0xc, 0xcc, 0x0, 0x6, [0xffffffff, 0x6]}]}}}}}) futex(&(0x7f0000000540)=0x1, 0xa, 0x2, &(0x7f0000000580)={0x0, 0x3938700}, &(0x7f00000005c0)=0x2, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000640)={'gretap0\x00', r5, 0x8, 0x80, 0x4, 0xe2d, {{0x26, 0x4, 0x1, 0x37, 0x98, 0x67, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @remote, {[@generic={0x46, 0x7, "f4b22065a6"}, @lsrr={0x83, 0x27, 0xf, [@loopback, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @timestamp_addr={0x44, 0x34, 0x43, 0x1, 0x1, [{@remote, 0x800}, {@broadcast, 0xff}, {@broadcast, 0x1000}, {@empty}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}]}, @generic={0x83, 0x8, "992f0b6cfb1f"}, @ssrr={0x89, 0xb, 0x47, [@loopback, @empty]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0x8, "890e81dd6f79"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000840)={'syztnl2\x00', &(0x7f0000000740)={'erspan0\x00', r7, 0x1, 0x8, 0x9, 0x8001, {{0x2d, 0x4, 0x0, 0x14, 0xb4, 0x68, 0x0, 0x80, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_prespec={0x44, 0x1c, 0x64, 0x3, 0x7, [{@empty, 0x6}, {@multicast2, 0xfffff001}, {@empty, 0x2}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0xfe, 0x0, 0xb, [0x7, 0x200, 0x40, 0x1, 0x10000, 0x6b, 0x6, 0x4]}, @lsrr={0x83, 0x7, 0x5a, [@multicast1]}, @timestamp_prespec={0x44, 0x54, 0x93, 0x3, 0x8, [{@broadcast, 0x4c}, {@broadcast, 0xea8}, {@empty, 0x6}, {@remote, 0x1000}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x2}, {@broadcast, 0x8}, {@rand_addr=0x64010101, 0x6}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}]}}}}}) futex(&(0x7f0000000ac0)=0x1, 0xc, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x1, 0x2) 16:38:01 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:01 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001200)={{0x1, 0x1, 0x18, r0, {r2, r1}}, './file0\x00'}) setreuid(r3, r2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000001240)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000001280)) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r5, {0x3, 0x40000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000001300)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) add_key(&(0x7f00000024c0)='id_legacy\x00', &(0x7f0000002500)={'syz', 0x2}, &(0x7f0000002540)="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", 0x1000, 0xfffffffffffffff8) 16:38:01 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) semget$private(0x0, 0x4, 0x2) 16:38:01 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:01 executing program 1: semget$private(0x0, 0x0, 0x2) 16:38:01 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:01 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:38:01 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) syz_open_dev$loop(&(0x7f0000000700), 0x3, 0x292800) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:02 executing program 1: semget$private(0x0, 0x4, 0x0) 16:38:02 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:02 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:02 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:38:14 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semget$private(0x0, 0x4, 0x2) 16:38:14 executing program 1: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:14 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) syz_open_dev$loop(&(0x7f0000000700), 0x3, 0x292800) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:14 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001200)={{0x1, 0x1, 0x18, r0, {r2, r1}}, './file0\x00'}) setreuid(r3, r2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000001240)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000001280)) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r5, {0x3, 0x40000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000001300)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) add_key(&(0x7f00000024c0)='id_legacy\x00', &(0x7f0000002500)={'syz', 0x2}, &(0x7f0000002540)="c301091b0cb2bdf6382e069abc486eb269f1df7fe9db4722880db360331c06423e39aac394e18f8cad6a5bd7992639d1b4dd708aacfd1f38994b8c3b56119e5f6bdb243807a687a3d47626c2a47770312ed53e28ea31fcc086dc4ef5c06c5d9e193e0b0aef9a9548bba470af43a5ec3fa493c7943dedd8e7a01748d4662010a333726073103efbb183fb3ddf3e4b7a58152bcb288db81287f4e4f0735399360165aeea756eaaf6644f8a2fdc0b1d3af227613b502a9cd54a04a6faa38a7e9b69548ffcb2db1d58ac5a14454c531503b4df8373e39f1a4ffeab8c54e733947a420d0741eecb5cfd3ff85ecf3af4aec9ff2ce0b426576a15f0b9461cd60003f68b1ca3f40cbaec1fa88e25241e877433744f964a70339da8793907fa2d798ed7ca047420306191531f301e1a5c4018308e21cdc2ca4341662bfeae1e69f5e7275032259c9f30bf56ed0ec362b4e81ff7bc1df1ad8b4d2802356ea86f02935623340e47360d990726e4da2da3d5725e70321c5dfc284f885b387d43dccdaea0872d290fc62f08b91e60d0461eacb3899bb5f81bb1f8e99f46e783346a89424361ea7783b42fa684ad00bf5989f1ec50699f503541727f467225f08c47f90638e99e15e890dfe96acba421f8ba945cdd07c8c74fda8b24dbd53e082342531786a86245622e0b6a43eee06b612261d64c07c11a32b4d626b51844277ebc19fbc6672c34fd740e7a7a76b3223275efbe074a2e844d04fa8fe2f5ed1e23cfaef524ab87382e535c31ec42e439ed5fa4854d95a0cd93ab1b97e938d97029acc544b99f9add2ff78c6be96c2dceeb9834b1c5dd44613451e682d5042fe822411ebe04c1babd260dba3e0a1e3b6375432b4b02098d26edc720e9e029aff28d8dd7f178a1af6bc620910ade1408a3d81a75f4e7713c0b9a99722d28f1b8ab5c8175bd51e906901c54b89e70431b5da9f70f01b2748fbfb6ab9e61a34434dd0d4f495d49ee82de5b40310d148e2dc9613c8b9ef2778d31dc7dceccc2526bbc69cd21b56c813a3a27c2ebc91f8d583a4502809e92dfbe8d108abbc37ccbe3c55cd475fa0d4e6c7004a822801d1a67cf565ac83636b88f8e6f4d9faa4fc47b591cd6ff6e59709fbd80ffe018e78f4f01636f23c4f9d98a0aac12f27680eaee718dd49238ff8fa2a80e827678942931383f64a1730eb9cb7b91554ef780da2574ebc19937a851f9e755400cd3a17d93550c41c893f279115108964057e68458425ea2bdb922cd0d02461d29b23cff5ace0deacef02207c27c2d9064d2710a13b7c141105c1b37a362a739ca328416007b0e116a94b50e07f83da8a1e0a1a5b2c3ccac8a6524e783d7f6c344a687871f6181e2c1a8ce7b0ae0da848fb9684c0b71a52eea2b2620a19df70c8687eb2222b2da1580ab50217956ec1fab8b1006108da5ce45c4ff7c564242403140717d8a3d4f4dc0c564ac9ea2b1772768f2420bf4164f610020d4ce781e4f370a75f4e57414b032dd752138ee980c23bcee26977244b787aa6d5b1eed38b77c356561564f93eeabdf40c1aad55ce5a82c90d850aff5595f68db3beec8ef9fd0c86e33fc57e9db7fa082d6d546ec50d0eec88e9bb625bb36ed3e79b240a464c82d9acabd45a202270a4ec39aa1ae62b412ea1670837ad22f888fbde4f274bafb4e3e9fd9fe50f5f3d5395f99d8b38ebca037b4fe22bc2ccf6e5670cb2d05f7e6acffdc092707f8f78c6eb10d709e17ac25cf367aadee58d43a4a7de7d1006c8e6ece71f0e48b1b22d29d622c3b366a39ae78a3ce7f334fd3d29457b296aaa5be1cce2b63ba84b4d0f7398f3c0dede1a1d485a55a978c99aa0ab4e78afae3e2843cf7200c6c30a1ee5378ae06abf5ed1cf95ce1b14f4135669f5eb05c5fb183d643494661dd75c55519892ce92f78f47bf9004926b22408e9b82dad31ae7e7f65c547f8a7a60abd9096216bc95e168e4a1f8de98d182ee94ad91122945645cd68b87e1790ff2648802fc6c9835e5297db4817893c4b1a343b279af16ba92325da493c1b4fb0e71c463d415a387647c2b27c286313c5c0e92d9b263347ee19bf625d1dca090b6385bfc1e867c2d4c4464fcc30581f68c9c4b11a597cb4538dc7c9e92529048798bd48f7420dfa1561653eff79e128b1269c773e0a41c4d475019dbec4781fdc919ee489e09c4ff03e4c8660c281ef30670e19f4debc6733d13287295ca407db7a4e427986bfc7657e729ced890391b19a1bcd15741a4bfeb77b74071b7f938b65c2e0b7c1d706487f5d0ee6495ad406acba8a5596e06e2b70a934ec778a8676ffe5ce4d65cb50e325a6e7580752ecbef66bbdb06aefe3e8ad4d99c014735ea1c961c6bffa4a112c62698957de168ad5b6adf2ee8ae4b6bb16cfcc40a96ed9cf3ac5147ce844c6c88ecb516b218cca44094785227830232816178b20b025bbfda0408ab071fc79343ee9ae2aecb9812ec69972fe3a9aa767398c73ea97ee9dc16bf1ce00def31d62b642dab3ff96ad7f5ac745d7b527ff6ecf5db37d9f52e078a71971b19da319786331a1d472c29bdc09600c3af9acc955e825f8853dcca8f6285f9b88a6eb2d064a7e585660d652f6344f898cf66d90c8d10ce16a5e79e71dcdbded6a78a0558269f12aecabeaffc7db3995750e736eb0ed3e79dd12ad1558ba7cb1c3e5d2ed5b0d127eba92d2221310aaf08334efc533c5aae2df7913be1d60e5bf365e719ad9d5c946f5a1c5c39fd63000247056aac2af38acd39d40f3ff9a0cc77b1a73142eaf91c9cd8ad021fed8237e412a1af34547f4919963c933d5019adda68d428e39b66137190a3d3eeae6ea199cd20552bf01a7a12c427db8a77747c838c7bef8fafe14d58a73d339b7f6a71969f2499d4187908b16cf4e46949ca1058732ed9d473181d9dbe1b218a062d4b498e4e5923237c58ebf9f7ccdfe61c922f5a2bc808e9b37f229de5c3472bada79f4055a3fbacd14677e80655eeab37d47cb9af182f22d100c5a4c872b0db944fcf8ab3d74cb8306b0ee65cbc69065bfc275115e63adfd739e3b5e01dd7c67d47090804c06be8e943bda5f99ae9d6252247642fc5543a662976be20ac559392dfa3350aa6f525549d1627435512962b6e7c1fc769f291fbd1ff62d7246a0ba25615d5b889f84d8e47e4058114720e3a771e30d7afd19eb2f4d99ec50872940bf4a4895702a3b874f214c8d68de084bacaa14e6e431b5298afe8043cc526f556a35531d7d7a0ec9cb557ff94da3737d0a2402aeb9122c0cd9fbada39a9350db22c37db75515b45fbda289009dafb9e0ec8425955e19d11be6f07b7920aa9498d4c75d8f4923ba1b0e2289177b1ea06489db57e823bcf5fda8c767142de5b9b2f855fcf2995f5250e08dabad2c00d2272bf6999bc5b5d7fc25db22b100a7cff172fabc22dbb34bd2f5f9db0707f805db035d177bad52513de6eb9cb1b18fe3ececdf1ae3d3c4265088ccf6e5ca289217279873d3a62cd8447f367d4c74fd2d62f72cf6346b278c67999a32a342cb001c6ce9463049e4ac96579e10137a2557cbd32aa6d3d3aec2c3cd0fc6acaa6de70ffff5a9b930490005ce45c3125008b4384bd11a6b90a6e0edd65d9cc036cced7b1ce64fc731ac2aa09398df4f1a4b7c96fc4c4e1ca1fe5a209e725f76d66f94eab9c850c0458fcc1597d6acc63f8796a4fa89572be71e1a78bd1232f832c722dc600d8e1b884422cef099965c503314487ef3cda18564438689bf97b65ac2825ab78088ea90e191d429bc6f5ec5cd62a6dbc4da7e2df7ed9c8be57a9e7fff099913679c78a36a4e83c41fd7383c7ab2df54f76371bb682065a5646c01109c436033b8790c66c6f2375ce2197e10d8e1d7131f44b04871b0dff46e9c48130462ed256d3d559818240006d4f83380be33d58dfc699237087241d132fdaac11787a9ef4a6da2281755255b39f1d07204a6150933455328839f4ad631baf863796a6b200cce910abac69d0dcc8b0f06d78612dd7a41d866b5850e1ed4f1f1973b2f2308e059c919bae9896e375eaffd00af5335015ec1eb81171c36e36315a447d2424e0e703b5c9c47a5773d55ff4aa11d8c11b42a0c95970eed236f92e300c3b11f6c80a186b4b2711c8236623149ab9ea41e3537deff45404e76b3bd0c0d7fae4f2b01593997fe13d38d065e9a491397dd6071f7e69c5d855da54e365356ddde3cbaace0862db066c82d0c789ae7ca4e3bb630ab136bb916d2c40890457ee2ff0ccdadba0965206ed6ba161f9df0e3f5d5e7e18f1909e4eb1afae2dc002c86993632a47717e58845582d6de4af3aa40474890a2d41674f67ddf1511ebcf9051bceae7c07ec8001c71e80547e2ef590dc619716413ab997225f383f70cdda07f3f3fb24ab8bbc134bdcad2fe76b16ee07024eaeb32d77dc7eb79834e4091de50faf49deba8f0beb86e661f9f5b41d597f1d14697900e23c8a1e0314fd8ccc381d3a72617b5cb9bf37a18603bfad2e7c5aae6bba9c42850ed20f8fe2ac38a0de95576d6ef57d6ecc5ad725237afc93a323a8d8822c4057b277d0e6bfff90616beff8ebef8c7f2abe2b76f63cab86876b255d2f884e66eb7137ef87c4c3d35c692405bc3e1a3bf4fd8d408f33665613e188dad1a82be80152bcf9bb34b59f9cfa7c093d845932835867b039d21a197adf66ee2d9516337f05edebbc996ff44b7e05382c031694075986c4bf0ad02f94dadc2fedf32d4f5d30e0bb8c1d9c9132587e01cfd56cda52dd9828343173f08c0ddc81ef64b7e2942f541d0fabdaa9839e98f64dbc51db44cc01d9f18a05560dc4fb19e28f32e212aa355c171cf2592d87c49f2ae3fb84bba9da98ea8e240363524afab4b439e2113ece557577f456e85da0628ec584b6fd6f984047ee91aa385032cb58cc30e0fe85e891bb88381f4365e672b748be88dd9f58ef0d3cbf4a327ef701ac15fc221638ab4fe5881fab49388a91ddd10f02185d8eb925e9f60c7efa0e433bf31c1a81354b04f34c3f74d5c131b4dc2ae1c3e7152649001acefeb233d7dd7a346af69009b50dfe6f2571f6591b219b0e1c43e3e5cd1bf7353356be99babb68d716824d1d2c4bcd4f504f1194e7aadca8fd9270cb079bd2acba8d74282e66e25eee75be3ef8920b11319f7726430f26677c9c6bd987818bf35a154d881221017bfdb82aaca9f32b1047fe5b2992aa96ea7bb2e4d9c8b6b1954ae7ea09e95cb66c1db41bdd0913d75a5cfe0a5746451f603ff6f55d1b7b855de30b44ef60ee1041f2fb937b2630752bf7af9047ff7baa135b3bcc846b4a8bb13d5578c383fbdc3049a1c568bd5b040bc88b824fb969632872b5e24dda3253a5354d28a4e6f64c7a149510eb6d1d9bd22296eb14517bb230708ae6db0d71276e48d318f8690936086b38765fe60c0900ab3069a22bc3cd07b495b4bc7fab49aaf6acdd1cb64ba9e97407b51bd555e0bb088fc0e39f76fa83130b7fda5ebc7f33a564309a6eb8520891ffe52cc5c2cf874b5687f1316bea3c9172cd26ee3264252bab7edd1571a53c9afba158c4441bfbe8a69353c03f24170f0412b17069fefb3fdbd93859809dc33ad9e3c49455d34e267c40680ab93122467092b3063e444b4be90ce7d935aad642d3254a7b2b275f0667a9dce6adaa611d36c8945417bb7a8105748c61e20bdcf66ee501e183667d0a6add3d63addfd7b5054aa000a8ea280e2cdecc4a6d1d9c0a83f4b0a34fa947fb1eabc80674bbd1311104a82cb40c2d7d5be61ddfaa47e2116e10cf", 0x1000, 0xfffffffffffffff8) 16:38:14 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:14 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:14 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x109100, 0x0) 16:38:14 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:14 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001200)={{0x1, 0x1, 0x18, r0, {r2, r1}}, './file0\x00'}) setreuid(r3, r2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000001240)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000001280)) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r5, {0x3, 0x40000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000001300)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) add_key(&(0x7f00000024c0)='id_legacy\x00', &(0x7f0000002500)={'syz', 0x2}, &(0x7f0000002540)="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", 0x1000, 0xfffffffffffffff8) 16:38:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semget$private(0x0, 0x4, 0x2) 16:38:14 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) 16:38:14 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) syz_open_dev$loop(&(0x7f0000000700), 0x3, 0x292800) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "aeafe64ad0f114ee19f43f911afa60f693e5a7aca524f614545b7e971aada961f2e98338b76679bd4cc3294ed93731dd2cf185caa3e0e5f81ef9226bfd136aebab0cacbcafa775790b84922148b32dc267e065df6ea05263293e235a0060792899f8dcaafe3e74531c1b86d01e6e546cf10dd0d3b65f8257f1672c1abfbcfe142bb8f55969d543157e8b790b316e288e005690bc92ae411c98056cb359a4d9001f3ef1c0d67353b30d3175402fc73ed08e8dbbde03c3f2695d89e2f81163250a81f0bde519fd8f0b5ff27de4b38e332ab3e2c06ae7e05481cd35abbc8266fca325df0895b66e6363c1cd"}, @ETHTOOL_A_BITSET_MASK={0x16, 0x5, "e9baffcb807e16b3cfe2b8cee3160d84bbe7"}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000003c0)={r4, 0x2, 0x1ff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x200) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400), 0x2000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r6, 0xc0189376, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file0\x00'}) setsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f0000001880), 0x4) 16:38:14 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:14 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:27 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:27 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:38:27 executing program 2: semget$private(0x0, 0x4, 0x2) 16:38:27 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:38:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:27 executing program 1: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:38:27 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:27 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) 16:38:27 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:28 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x60, r4, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x60}, 0x1, 0x0, 0x0, 0xc8d0}, 0x40084d5) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:28 executing program 2: semget$private(0x0, 0x0, 0x2) 16:38:39 executing program 2: semget$private(0x0, 0x0, 0x2) 16:38:39 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000040)={{0x3, 0x200, 0x7, 0xae, 0x2, 0x8}, 0x10, [0x5, 0x8, 0x1, 0xfffffeff, 0x8001, 0x4, 0x7fff, 0x5, 0x5, 0x37, 0x3, 0x6, 0x3f, 0x3, 0xdc5e, 0x3, 0x9, 0x4, 0x9, 0x6, 0x8, 0x8000, 0x3, 0x8001, 0x3, 0x0, 0x7d, 0x5, 0x101, 0x8, 0x0, 0x1000, 0xfffffffc, 0xfffffffd, 0x2, 0x81, 0x3, 0xfffffffc, 0xfff, 0xffff0001, 0x1f, 0xfffffffa, 0x9, 0x4, 0x3, 0x45, 0x5, 0x3, 0x202d, 0x7ff, 0x1, 0x1, 0x4, 0x1f, 0x1000, 0x0, 0x8, 0x797, 0xfffff801, 0x2, 0x57, 0x6, 0x7fffffff, 0xb4b, 0x0, 0x4, 0xffff, 0x4, 0x7, 0x8, 0x5, 0x1, 0x4, 0x56d, 0x5c, 0x2, 0x0, 0x5, 0xf5, 0x6c6, 0x4, 0x0, 0x6, 0x6, 0x7cb7, 0x4, 0x2, 0x8, 0x2, 0x1f, 0xfffffff7, 0x7, 0x55aa, 0xffff, 0x1b9f7308, 0x6, 0xffff, 0x60, 0x4, 0x10001, 0x3000000, 0x3, 0xdfe, 0x1000, 0x5, 0x6, 0x2, 0xeaa, 0x40, 0x8, 0x190bc595, 0x9, 0x8, 0x7f, 0x20, 0x3, 0x2, 0x7ff, 0x1, 0x3, 0x69db, 0xfffffff8, 0x80000000, 0x71, 0x9c06, 0x1ff, 0xfffffffd, 0x7, 0x8001, 0x6, 0x7, 0x10001, 0x1, 0x100, 0xeb06, 0x3ff, 0x100, 0x1ff, 0x556e, 0x7fb4db1f, 0x200, 0x800, 0x4, 0x1, 0x9, 0x8, 0x7, 0x2, 0x5, 0x6, 0x7, 0x5, 0x6, 0x39d2, 0x0, 0xfffffffa, 0x4, 0xfffffff8, 0x4e02, 0xffffffb8, 0x5, 0x5, 0x401, 0x1, 0x7fff, 0x0, 0x0, 0x4, 0x8, 0x101, 0xad, 0x6, 0x2, 0x0, 0x4, 0x3, 0xfff, 0x200, 0xfffffffd, 0x3ff, 0x0, 0x8, 0x3, 0x3, 0x8, 0x8e40000, 0x3, 0x4, 0x8, 0x3, 0x3, 0x6, 0xcd2e, 0xffff0000, 0x4, 0xe81, 0x1ff, 0x37, 0x1, 0x4, 0x3, 0x5, 0x10001, 0x4, 0xfff, 0x3f, 0x8, 0x6, 0x8000, 0x7, 0xff, 0x6, 0xffff0001, 0x6, 0x81ea, 0x800, 0x7f, 0x6, 0xffffff2f, 0x4, 0x3, 0x6, 0xd4c7, 0x800, 0x0, 0x2, 0x80000000, 0x4, 0xffffffe0, 0x3ed0, 0x4, 0x5e0000, 0xebe, 0x5, 0x81, 0xfffffffe, 0x2, 0x0, 0xffff, 0x8, 0x0, 0x3, 0x1000, 0x10000, 0x4, 0x9, 0x4, 0x4, 0x5, 0xc489, 0x6, 0x1000, 0x4, 0x8, 0x3, 0x6, 0x10000, 0xd09, 0xffff, 0x8, 0x1f, 0x1ff, 0x100, 0x8, 0x0, 0x6, 0x8000, 0x40, 0x3, 0x1, 0x1f, 0x5, 0x81, 0x2, 0xfffffff8, 0x1f, 0x6, 0x9, 0x4, 0x8, 0x5, 0x7, 0x0, 0x40, 0x7, 0x705, 0x7ff, 0x84b8, 0x2, 0x5d2, 0x8f9, 0x4, 0x3, 0x3, 0x1, 0x1f, 0x1f, 0x8e74, 0x0, 0x8, 0x2, 0x9, 0x7, 0x3, 0x1, 0x0, 0x6, 0x9, 0x800, 0x556, 0x3, 0x3, 0x7, 0x10000, 0x1ff, 0x4, 0x0, 0x9, 0x8e, 0x80000001, 0x480000, 0x800, 0xe5100000, 0x400, 0x40, 0x5, 0x9, 0x6, 0xfffffff8, 0x8, 0x100, 0x401, 0x0, 0x1, 0x3, 0x2, 0x8, 0x7, 0x7f, 0x0, 0xc33c, 0x40, 0x1, 0x80000001, 0x3ff, 0xfffffff9, 0xfffffffa, 0x2, 0x4, 0x1, 0x6e73, 0x3, 0x6, 0x101, 0x9, 0x9, 0xffff6551, 0x7, 0xfffffffd, 0x200, 0x7c, 0x1ff, 0x9, 0x1, 0x4, 0x37e9, 0x7, 0xfffffff8, 0x9, 0x6, 0x1, 0x8, 0xff, 0x6d446ae4, 0x1, 0x20, 0x520, 0x6, 0x7000, 0x10001, 0x2, 0x10000, 0x8, 0x2, 0x800, 0x69b791a3, 0x3, 0x8e5, 0x8ab, 0x5, 0x8, 0x100, 0xd, 0x0, 0x2, 0x1f, 0x5, 0x3, 0xf9, 0x0, 0xfff, 0x1, 0x0, 0x400, 0x7f, 0x4, 0x4, 0x4, 0x7f, 0x7, 0xfffffffa, 0x8, 0x5c, 0x80000000, 0x1, 0x2, 0xffffff0c, 0x7167, 0x0, 0xffff8000, 0x4, 0x4f, 0x3, 0x7, 0x2, 0x401, 0x5, 0x6, 0x4, 0xa8, 0x3, 0xbad4, 0xfffffe01, 0x0, 0x3, 0x3ff, 0x5, 0x100, 0x8, 0x9f, 0x40, 0xff, 0x1, 0x0, 0x76e9, 0x2, 0x9, 0x8001, 0x0, 0x4d53, 0x40, 0x2, 0x4, 0x0, 0x0, 0xffffffc1, 0x10001, 0x3, 0x7, 0xa, 0x10001, 0x6, 0x9, 0x2, 0xa7, 0xffff0000, 0x2, 0x1, 0x4, 0x2, 0x80, 0x7f, 0x3f, 0x8, 0x4, 0x0, 0x5, 0x100, 0x8, 0x7fffffff, 0x2, 0x400, 0x1, 0x3, 0x1ff, 0x9, 0x14d, 0x1d6, 0xbbc5, 0x8, 0x9, 0x9, 0x1000, 0xe7b3, 0x3, 0xffffffff, 0x7, 0x0, 0x4, 0x1e9, 0x40, 0xb54a, 0x5, 0x5f05, 0x1ff, 0x6, 0x4183, 0x8, 0xffffffff, 0x9, 0x101, 0x3, 0x6, 0x73f, 0x8, 0x1, 0x2, 0x7fffffff, 0x80000000, 0xfffffffd, 0xffff8001, 0x7, 0x5, 0x1, 0x100, 0x0, 0x800, 0x401, 0xf1, 0xfff, 0x40, 0x5, 0x4a, 0x770, 0x3, 0x50, 0x1f, 0x1, 0x100, 0x7, 0x1f, 0x1, 0xffff, 0x80000001, 0x20, 0x0, 0x2, 0x80000000, 0x100, 0x7, 0x7, 0x3, 0x1, 0xffffffc0, 0xd543, 0x0, 0x9, 0x917f, 0x1, 0x1ff, 0x4f00d710, 0x1f, 0x1, 0x162, 0x43e, 0x5, 0x10000, 0x3, 0x3, 0x78, 0x401, 0x20, 0x5, 0x20, 0x94f, 0x9, 0xfff, 0x8000, 0x1c94, 0xfffff801, 0xff, 0x1f, 0x1, 0x4, 0x366f0be1, 0x8, 0x6, 0xffffffff, 0x9b6, 0x760, 0x8001, 0x6fe3c7fa, 0xff, 0x0, 0x80, 0xfffffffb, 0x8, 0x0, 0x2, 0x4, 0x7, 0x3, 0x0, 0x2, 0x4, 0x76ad, 0x3, 0x3, 0x200, 0x92a, 0xfffffff7, 0x8, 0x8, 0x9, 0x7ff, 0x6, 0x59c000, 0x2, 0xffffffff, 0x401, 0x6, 0x707, 0xdf74, 0x0, 0x687, 0xfffffffa, 0x2000000, 0x7fff, 0x3, 0x6, 0x85db, 0xffff, 0x6, 0xfffffe01, 0x0, 0x5, 0xa017, 0x3ff, 0x7f, 0x4000, 0x5, 0x8000, 0x1, 0x0, 0x8, 0x9, 0x15f, 0x1fc, 0x10001, 0x6, 0x6, 0x9, 0x5, 0x1f, 0x3, 0x401, 0x5, 0x101, 0xff, 0x2, 0x2d6, 0x9, 0xada8, 0xc76, 0x4, 0x100000, 0x1, 0x0, 0x2bfc, 0xffffffff, 0x8, 0x6b02, 0x3d000000, 0x100, 0x7, 0x0, 0x0, 0x1, 0x1, 0x3c, 0x3, 0x8, 0x0, 0x5, 0x9, 0x7, 0x6, 0x9d, 0x4b, 0x6, 0x6, 0xffff, 0x5, 0x8000, 0x1, 0x4, 0x8, 0x7ff, 0x3ff, 0x2, 0x10001, 0xfffffffe, 0x401, 0x200, 0x4, 0x7ff, 0x3, 0x7fff0000, 0x4, 0x5, 0x8, 0xa834, 0x3, 0x7f, 0x81, 0x80000001, 0x4a9, 0xfff, 0x9, 0xfffffffc, 0xeeb, 0x51d, 0x7, 0xffffffff, 0x1f, 0x1, 0x6, 0x8, 0x53, 0x200, 0x1, 0xffffffff, 0xff8000, 0x0, 0x3, 0x2, 0x401, 0x6, 0x8, 0x5, 0xfffffffd, 0x7, 0x0, 0xfc, 0x8, 0x200, 0x9, 0xfffffffa, 0x7, 0x4040000, 0x9, 0x7, 0xfffff801, 0x0, 0x100, 0x7, 0x91b, 0x5, 0x5, 0x200, 0xfffffffe, 0x344, 0x3f, 0x7, 0x10000, 0x4, 0x3, 0x5, 0x9, 0x5, 0x4, 0xc28a, 0x1, 0x7, 0x40, 0xbfc, 0x3, 0xe0000000, 0x2, 0xfffffff7, 0x2, 0x7ff, 0x4, 0x7ff, 0x3, 0xfff, 0x3, 0xc1e, 0x1, 0x2e4, 0x7, 0x8, 0x1, 0x4c5f, 0x8, 0x7, 0x1, 0x0, 0x4, 0xff, 0x9, 0x1, 0x1, 0x5, 0x9, 0x3f, 0x6, 0x9ce, 0x8, 0xff, 0x101, 0x0, 0x10000, 0x0, 0xb70fb8dd, 0x3f, 0x7f, 0xfffffe01, 0x326, 0x51fa, 0x5, 0x800, 0x10000, 0x8, 0x100, 0xff, 0x1, 0xc17e, 0x6, 0x0, 0x8, 0x8, 0x28d3, 0xf5c, 0x0, 0x2, 0x4, 0x6, 0x7, 0x3, 0x3, 0x1437, 0x4, 0x3, 0x77, 0x4, 0x80000000, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x9, 0x7f, 0x80, 0x24e, 0xb7e8, 0x7fff, 0x2, 0x8000, 0x0, 0x9, 0x32, 0x40000, 0x8, 0x0, 0x1, 0x65b09118, 0x7267, 0x3ff, 0x4, 0x2, 0x30, 0x1, 0x0, 0x1, 0x3, 0x7b, 0x0, 0x9, 0x2, 0x80, 0x4, 0x9, 0x6, 0x7, 0x2, 0x1, 0x6, 0x8, 0x70000, 0x80000000, 0x3, 0x7, 0xfffffff9, 0x9, 0x1ff, 0xb3d3, 0x10000, 0x1f, 0xfffffffd, 0x5, 0x7f, 0x3ff, 0x1, 0x9, 0x3, 0x4, 0x100, 0x2, 0x3, 0x20, 0x85, 0x40, 0x0, 0x4, 0x77, 0x9, 0x6, 0x401, 0x1ff, 0x67, 0x8, 0x0, 0x1, 0xf100, 0x257a, 0x1, 0x3, 0x0, 0x9, 0x40, 0xfff, 0x1, 0x4, 0x2, 0x2, 0x4, 0x7fffffff, 0x91, 0x8, 0x9e, 0x80000001, 0xffffffff, 0x1000, 0x2, 0x2, 0xffffffc0, 0x0, 0xdd4, 0x1, 0x1ff, 0x4f, 0x8, 0x0, 0x7, 0x1, 0xfb, 0x6, 0x2, 0x5, 0x6994, 0x9, 0x821, 0x7, 0xb0a1, 0x0, 0x40, 0x7, 0x4, 0x459, 0x8001, 0x5, 0x7f, 0x3, 0x40, 0x8b0, 0x7f, 0x1, 0x0, 0x80000001, 0x6, 0x6, 0x8, 0x5, 0x3ff, 0x3ff, 0xfffffffe, 0x61, 0x100, 0x1f, 0xb029, 0xfff, 0x6, 0x4, 0x4, 0xbb5, 0x6050c56c, 0x0, 0x7, 0x2, 0x9, 0x9, 0x9, 0x9, 0x61b0, 0x9, 0x3, 0x9, 0x7fff, 0x20, 0x7ff, 0x0, 0xffff, 0xffffffff, 0x5fdf, 0x9, 0x4, 0xa2, 0x3, 0x4, 0x8, 0xf6, 0xfffffffb]}) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000001080)) syz_genetlink_get_family_id$nl80211(&(0x7f00000010c0), r0) ioctl$HIDIOCGFLAG(0xffffffffffffffff, 0x8004480e, &(0x7f0000001100)) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001200)={{0x1, 0x1, 0x18, r0, {r2, r1}}, './file0\x00'}) setreuid(r3, r2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000001240)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000001280)) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r5, {0x3, 0x40000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000001300)={{0x1, 0x1, 0x18, r6, {0x1}}, './file0\x00'}) sendmsg$SOCK_DIAG_BY_FAMILY(r7, &(0x7f0000002480)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002440)={&(0x7f0000001380)={0x10c0, 0x14, 0x300, 0x70bd2a, 0x25dfdbfb, {0xb, 0x20}, [@INET_DIAG_REQ_BYTECODE={0x5b, 0x1, "cd404d5f2524a73e99db5e7240dc2700d2c92aa5d6fbff344f6b20eae086ba0916c05c7f72f4f1b37330ca5a52e79e34f5d67842ec9a96f99394330693c659321838fa0c2492322e620e5e37d246b0fec8afcd975d2787"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "be4d290a1e31f8e98f44d40de39a300b6f3671d6a3e82e89d639c23d9c975af2c453ebbc2fc87a7347053c9ab213821e302d9e1aea7f619524e1fe54d49eb4d1c4df4c9dff37dcb66ffd5e94df0e8fea788e8712e3ba4dd1b6dfed7d3d41f3c0e02f3e66cea8ce7a998707e03e2237b8481937ca6673276087700b478a13fb11de52b66313509584e821922fdce0bc009d331584aabd285cdf07cd9af81a6832a91e8ad0555ca612c1059a55668d74868cda9e75e93381a5140c15e68da7731c2f71bd6a1dd9c67a62faaa84067e140d32905622e2a5a274b70f9096de0aad63fcec2179ffe356ba96d9ded62ddc79f20aa16d6ec856695ea02f5d478a4cb6b30cee9828dc758c7eaec88e2f505d44fa340ed739ef7f840815a06353a75d32054a58364e5b250a4f738496df2eef52829e0ad7d0c3d1627ad3bfbc2d6a842558d8c9c3f6a749f6f0b2b6d4772e6b55c4f629a398638abae519e9de4beb92337f68f01217b02836cd5a73c4d534d244beb0ea9dba736917683e1546850cde3f56ee1f4d134c2a61b9a6521293d17f0bd72d6284eee86fbfc628a8333694a36f664352b3d64c1d3fa35336b4ef83eeaa7a26ce3523d8b0d6eb1203189d06684f24946e96bd988dbdefb8a77219599f05267f519bf74ee2658f60c423c265862aca6a9c1ea320206739a61987abbcd1da7d92c027eb9e149f59e13b8af2b1e2b2ec35626eaebb287c8e06dec839a5fc8d92db0cc06153814c887ee218fa4f3a3ecbb43e2497956ef179fac914941d01af1aa47f4d0cc79d12a4e66c182b13358319dbd02210cbcff5f4ad0222cb8ca2576b08d79273c33ea71e780454f9fe446214122034c1ca5b73492aeef7c2e61c9da3b6dac7b600dfb10c061cb0616d8fc509119ba6cd82eedd5f6d7aaff9998efd70838d3a3892adbf859aa5a6e7318651cfb679008425c4262ec3873d1244238ee8f5cb64969199eef58340b3f13076ae8aaa643404cba72a707219e457bf3e20973dcc39fd31c0ee4560c4eefd2c54b1e37836b4ae48e3674eb0f2f300a32287c7fd8020c960487d464074b380c62504839c1d917c484526605f7c90f18025693fc7d3d758e23dcd909a1cc556e11918bc039977dd3b19fbae8328671f786348705c0b60073c37e3a9888a5ff29ecb65ac07c5f84def1d58a87ec44245088d278eba493feb67352e95240a49ac1843556459a1ff6ee950bd55e60733a556433e9722e95923414e6489ea8e419e201921e8fbec2922db0b2f24909dfcdf50c0116413e96c6a9ee468b01e2aa81a7dbee7d63a4683e182899e723c6e1cd552864b48f95a12630edfaa4017a2d329a478a2f7d807e315bfc76749684715e7c475345f75481ea76de30f6985b99ff035ff940fb78bdf8527927994977257c07d382cde46fd249c1e07a990f7e32987a31288ca1ab0566ce69febd07cf563366e709f2a51d1406a2c1e30386478199659cf4afdad5e9170e6a02d86370d351ef5e63f970e9f90c5bfa0a95c72a6ebcca6a32eb30d7aae8128a37189c310361cc47949f86d2eb097618f7739e309b7f328bb795cf028f8fb13e3c33574ec44efa8a5d531701a0253ef35d93b38ff0183df950ef3d54781ef9133c75e52fe225fa0d034c56849f9f0c0eeaf1591a9c90f14d4d9ed3536fa373a94d915b240f635bdd52aefadccb9472029a7167691681b19b49a5d682d1cdcbf8229d42f0f65b945421b58d29fbde3f470d36d6619a983778a7e46fb1c15a1954a427de335b2387f336f179cf1c47232e718143a3e5a8846ce07e35847814a6145356d1734f66dab32fa7d967e47e706d5956e112fe794ad1dfb498f86d50c11578ea35248cfd9d57a6688c9e65bc230d4e58d4a260b6273a7cab7cec34ed9a826ee594f66a68eee2d6b2c332e440fc9a5e9b2fe7791fc41c8fde515feabf9dc88f0d6b674fa371992fa4130c781da38e1735e5139422508c061d9cae8f83e6cebe45c649f1e79e728056aff364ebd2674dc50e9b2f1c12b057c3b8a6096e90e18962ed9d3efd19d3b6293377421616c692afe20fcec0e7813398390ad3ba297dd7f8d1daa36be5e584cbd47c2505d2b230b136370ad85d2662b1745fcc199ef2395640b62f8fa4389ee922f6786b486fefb60a88c5030f6660aa95e20d246fbd15955835613ac0f9116013d6aaa90290b864d10ea5d9be64e2ad385799406ae6e1efdb62717ab09e17d7192ae2d43ef21c0145cf13905d869891d13a96c8355a9697c00a2e6889a9f8511b4f2606ce052b7e53d78ee4aa176f885dd8a9b2aafb57666a762ad006de1f34eb75668d8170cc1544fcf0a5306638fa89fc137677a6568ab6c8758380c485870785baeb7de164757034f6cc41c15db12e5adb7766198fea06120ceb53a74fee9693bf8f87885527a3791c7188d179852bc2f6f3545309e9eeb65eb94b34e44aa9e93002bd77019b88d1e2d16546c4c2105c8b1e191f3825e1285d04d55062c94603eec82879e38260dd4720cce1c7623c82a9fc0486014aea09fc10d062155b8761867f26fa2e7d0e6eb712d60aaef7e2e5a47691353e0b55c75a4a3de01a6fd72435d887782db841760aa8f368727788da74fc38d319fa4490f29b8394781260fd81b9f6a6ebea3bb5a2a2d56a282de58363cc1b216bfce1a34e6997d9cf48f042472a1ff442488968ef65b1e692b82d58d637a30a6af139d1ea8dfce6deb598ffb84683c60f2b2d177e9cce0d6002633c63457decd6f97bdaade5af287410e4029bd811c4b4afc17f31c107d375a13e81534d580685c08ee31c8e0aa8758c81a3d0aa816b88ef0d82d8af45515270e9396d16d16bbcd7d57ac98143f59d64b575486d8566d446c100346fb53d241b6f5f727fb9a1ecd12fafca60f4830b0ad98ea8b0c29725e34aa8cad3a213fa4e666b1baffcfef30057a1daacf85ad6836407fb8738d1f6644260afb770a0a19ebf933dd4cac0de6e7e70f5aee18241a57e0135bd5c2899248319a3f201f43f1df47e11e1670c4c341facf063abe6ca3c04902c766cd3863d0b977cfcce8a86f7908982b200f1e42dbafae3aff3d9bdabd3003d0529cf0ba0c05d7248049578aff02fb7ed912a6ddf255b8ff846b65e7b519933314a996b2ad0facf57fd1eb0c1e99db536c3693b1f15ec5f38af17186116951ed4ce242bdacd8f985cf433a30f88a51a5850d7f64fa773166963dae85a06a414eb0835e12d1cdc471b42a1a6cbbf90ecbe770550ea68cdfb8816f51bbabf2edefa081ed9904a4c1143326e1836cdd071fd03cc81149999621618865ea437a66dc9270e9a7bd24a734fe3cd2ce6dfff2614966107d79c9f657507d369e792ae5b565ebe534f3bc591c280a8f48e28280d4a435d63732e7f3a8464175fb67f7afd48eb85794aa2c6bfc67e4aeebd21b906cdabaaeeec0465e1baece8ea5e1bc6621a3a3eba2593b5a3d70876514676580c65e843b95041c2f8f5dc8ca7e99d71d9ae948d04a984d80e55626ee443fec5655e62a6964cde1f646721bc57a11430b7d53b15b1b477f542011f31df35b9fcdcb1df392555bca81d9533c2f93bff30ebae1e50032357261fd466d3dd5b9679e992d7df3f5d07bab1e633c6b29ade5b690e832ba512599a9ef36b8c965a4c027c27008def688366ca2bebb7faa9da9e7b03689cbb8ea77248b7777af747dd94bd4f34e3e66ff69bcbc7357131d26c286cab7b7ab7d8e7c10f2ab22bfed937151e15083b8f82eef62696559ba3ce0cc0d8cfe17940ae2bf952dc985e65b6219b2aea47de95d0ec7d63b82144de42c51d303faf920f214ca41d525b8e77a9e159ab2cdb089d3896995485595a1bcf57bc05688e71784c69f5b4faea0b9aac57bf5340bad0c11446753baa4c3caaf8d42b3bd221e8e3a1e45b1c22e1b8a3f83a96f2b8d71f336cbf5ba545dadcdda245e7020670eae9e5b32ee0122abc72e95bb72e8cc88c2f387ee71e669ac55f3ee4c9ab343c330a1057c702bef4f498ac2893823c77be4abb0eb8d34e1a73fdbcff5ad73a4b2c68ace81bb3ce5f8eb7734ef4e6dbeb5edc6301bdebbc825fc50debf27fb5851610f34c3da71e68dc4cf17358d6e3a0cc5510a6d359162fcde6bdf8160f1623e1dbc9cef04969046dc261ae8ecdec9c728dda478e1f6b52e7029d5c8f5451e8d24a681b6fcd47754e2bbe41eb21c6a0a779abc0b2292535b5661a584caff9eb2e57d8fe385be53e4dd843e7550658c5f1f496cba47a291239c20a2744f83ed6341b63eb064ba9f52af9cca1eae8d77d10c4f807d605f91bdc06bfce9ca12cf79134c7226322adbc2c1353fa525cfa4a3a3b3ba8ac24cc9ed2a6105b3565c309cd25b4007d3c80d58f194df45a181dead28fd83fbc3e346b5c95acecd078bd422972b2b050b9e27fe9b9b7a9cc1cb67370822554f5b0f78158baa6b42a93052bee723389219242906fbb5b77d5955794c47328be0e13ead52b671b4cec575a1f45eebeab35d6b4a2b62832b0744d0fa4034a5f30991c2520ff079d00298226895801354c903586e65a2ee03219de8935df424103d726f2c8a72097d6be86ad315880516ccfdceb51249ead2f6651b8256aa136cf24ceb180e21be504c024f7c2069010801e71027787ffe3a5423f301d6c0507e14ebe6cfec37dbed9e21a98698c3211ac152851878375e80969c98c3584c9db5086f88c07c7fb7b100fbaeb6bb276a5216da70ec8398efdcfbe861093cae17c394c1778bd7077ed79202c49f6de7474235bef1fed1f44c043df995fdc8596321e559694bf5d9c0f9ebbc29d915d5635444517eba3f432166de2b75b915b26e11aa7982d17ef9ea0252309c18a9ed4caffc0bd18ef6dc78fbecf18cf185a00fd677e83e138a073179d97be983c1cb0327ae4577bb3d8624691f6f56d7565bb02e3285cc7e6ab681ad2b1df53af56c28e7ebae59fdf059893e0bd92377996692724b5e5fcb947d286b33e8c859a01347037189dc31f4353ba63d2bcc16a5fd0e79eaf89d3e98a255c72f9a4280267d41067ae9633bb2a81bfaa0ba8cb3fe327f2c3c54a5e16edadce34b953a4aa8d5dc803bc6c36c9d00be2c0266870dd605942599b86c9489a43a642c7ed6c44bf3ecc7274f61c93a73d29c861f7a95acbc68c4a2954faebf3cf036cf50c80f1114cb895310352c0d2b18651fba60cd7dc890ed16901b6be4a149d5bc3a5c128b71f376e57286dac213d82fa4d30e4940a6714872e052865850aa450278c6ae88b1cb15e2160f3caf2582cd3aa4e2208be3205382bdbd8c47e8f2671250c115bf7993434857aed279206efe078096418227f808c82a5cabb3620d5803807a17d6845146cfb7a88b2d17a930af03e3098e4506509533dbeb226e063d3e5f946196b852d87d426603e186a57664182d9f744a8e7f79ea16edadbb2587e30a8ea13c03494c2a0b09b82a58acd349671891f5bc42cecc26ded18e5c510b2f51e2a877d70e950da9e0e41487de8f882080ad849c7101b30d1e4e00166170be2fa61259cdd6291628adc8e61ebd86d26714205baecad4f9dcd0b1abc4dd1961ce711cf4e81aa7c7877d9e03d47d44be1d4499c0a33488375cfe5de241ea6a3268737b3187e9a60663df237aa455e83e97768e08ecd2b16f4b6205156f1f6d89647ef7f5ee3764a40078fdd0694ed0938809d7c72e8b3dbcca292ccc6323c02ea398402fcfd6f4149ab852882c5dfa4a8f7200b7e65bc92e0ecb33935e9083ab9887a4d4916db5950cef187246d725"}, @INET_DIAG_REQ_BYTECODE={0x4b, 0x1, "e7855d4ac0d1b96334d0945a53230c9d31792ed3e7064737f9316006822808ce7594aa8ad69d3653c4dfbc11c0b8a53cbfb358a958d307c9028e36fb6787a68651f88eaae77986"}]}, 0x10c0}, 0x1, 0x0, 0x0, 0x4001}, 0x4000800) add_key(&(0x7f00000024c0)='id_legacy\x00', &(0x7f0000002500)={'syz', 0x2}, &(0x7f0000002540)="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", 0x1000, 0xfffffffffffffff8) ioctl$HIDIOCINITREPORT(r7, 0x4805, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000003640)={'tunl0\x00', &(0x7f0000003580)={'gre0\x00', 0x0, 0x10, 0x87, 0x0, 0x0, {{0x21, 0x4, 0x2, 0x7, 0x84, 0x66, 0x0, 0xf8, 0x4, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x24}, {[@lsrr={0x83, 0xb, 0x61, [@empty, @empty]}, @cipso={0x86, 0x5e, 0x3, [{0x5, 0x8, "1e06a1e0f7b1"}, {0x0, 0x10, "77d6e8a40cce72bcbcf73ca60589"}, {0x2, 0x8, "4252a4a4866d"}, {0x5, 0xe, "dd1737674dddcabfdeb0be7a"}, {0x7, 0x9, "4911667e51468e"}, {0x1, 0x10, "5f63e6eed81bdceb50016184812e"}, {0x2, 0x11, "68dfb2ba2d2049be87e617d2043b19"}]}, @rr={0x7, 0x7, 0x8f, [@private=0xa010101]}]}}}}}) 16:38:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x60, r4, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x60}, 0x1, 0x0, 0x0, 0xc8d0}, 0x40084d5) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:39 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, 0x0) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:39 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:39 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:38:39 executing program 7: gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:39 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file3\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000340)={{0x1, 0x1, 0x18, r8, {0x5}}, './file2\x00'}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000400)) 16:38:39 executing program 7: semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:38:39 executing program 2: semget$private(0x0, 0x0, 0x2) 16:38:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x60, r4, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x60}, 0x1, 0x0, 0x0, 0xc8d0}, 0x40084d5) pipe2$9p(&(0x7f0000000780), 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000ac0), 0xffffffffffffffff) 16:38:39 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() 16:38:39 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:39 executing program 2: semget$private(0x0, 0x4, 0x0) 16:38:50 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:50 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x60, r4, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x60}, 0x1, 0x0, 0x0, 0xc8d0}, 0x40084d5) pipe2$9p(&(0x7f0000000780), 0x80000) 16:38:50 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:38:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file3\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000340)={{0x1, 0x1, 0x18, r8, {0x5}}, './file2\x00'}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000400)) 16:38:50 executing program 7: semget$private(0x0, 0x0, 0x9b903172c37b6596) 16:38:50 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='net/dev_snmp6\x00') 16:38:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 7: semget$private(0x0, 0x0, 0x9b903172c37b6596) 16:38:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000500)={'erspan0\x00', 0x0, 0x1, 0x80, 0x3, 0x101, {{0x21, 0x4, 0x0, 0x26, 0x84, 0x66, 0x0, 0x6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, {[@timestamp_addr={0x44, 0x34, 0xa6, 0x1, 0xe, [{@empty, 0x800}, {@multicast2, 0x1}, {@rand_addr=0x64010102, 0x80000000}, {@loopback, 0x800}, {@local, 0xffffae4f}, {@private=0xa010101, 0x3}]}, @end, @rr={0x7, 0x1b, 0x26, [@remote, @multicast1, @rand_addr=0x64010102, @broadcast, @private=0xa010102, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x1b, 0x8e, [@dev={0xac, 0x14, 0x14, 0x2c}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x28}, @rand_addr=0x64010101, @multicast2, @empty]}]}}}}}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:38:50 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000001980)=""/25) 16:38:50 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:38:50 executing program 7: semget$private(0x0, 0x0, 0x9b903172c37b6596) 16:38:50 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file3\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000340)={{0x1, 0x1, 0x18, r8, {0x5}}, './file2\x00'}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000400)) 16:38:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:38:50 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:03 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:03 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) 16:39:03 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000340)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x6, 0x0, {{0x22, 0x4, 0x3, 0x1, 0x88, 0x64, 0x0, 0x89, 0x4, 0x0, @multicast1, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0xc, 0x3e, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @generic={0x7, 0x2}, @noop, @ssrr={0x89, 0xb, 0xef, [@private=0xa010100, @multicast1]}, @lsrr={0x83, 0x1b, 0x7d, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @empty]}, @noop, @lsrr={0x83, 0xf, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast1]}, @rr={0x7, 0x1b, 0x1c, [@multicast1, @loopback, @multicast2, @empty, @private=0xa010101, @remote]}, @rr={0x7, 0x13, 0x4f, [@local, @rand_addr=0x64010100, @rand_addr=0x64010102, @broadcast]}]}}}}}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:03 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file3\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000340)={{0x1, 0x1, 0x18, r8, {0x5}}, './file2\x00'}) 16:39:03 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:03 executing program 7: semget$private(0x0, 0x4, 0x0) 16:39:03 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:03 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:39:03 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:03 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 16:39:03 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:39:03 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) 16:39:03 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:03 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x0, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:03 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file3\x00'}) 16:39:03 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:03 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) 16:39:03 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x0, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:03 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:14 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) r3 = syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000280)) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:14 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:14 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000017c0)={&(0x7f00000015c0)={0x200, 0x0, 0x120, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x14}, 0x4004) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:14 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r6, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file1\x00'}) 16:39:14 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:39:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) 16:39:14 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) 16:39:14 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x0, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:15 executing program 4: r0 = gettid() waitid(0x2, r0, 0x0, 0x1, 0x0) 16:39:15 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:15 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) write$P9_RLOPEN(r5, &(0x7f0000000280)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x2}, 0x56dc321e}}, 0x18) 16:39:27 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240), 0x82800) 16:39:27 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x0, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:27 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) 16:39:27 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) syz_open_dev$loop(&(0x7f0000000240), 0x20, 0x595841) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:27 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) getpeername$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:27 executing program 4: waitid(0x2, 0x0, 0x0, 0x1, 0x0) 16:39:27 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) 16:39:27 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) 16:39:27 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:27 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) 16:39:27 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:39 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 16:39:39 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000fc0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:39 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:39 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) 16:39:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000200)={0xff, 0x7}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:39 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:39 executing program 4: waitid(0x0, 0x0, 0x0, 0x1, 0x0) 16:39:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x0, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:39 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:39:39 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:39:39 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:39 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:39 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, 0x0) 16:39:39 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) 16:39:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x0, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:39 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:39 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:39:39 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x7ac4fbeb32a2bdd7}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:39 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:39 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:39 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:39 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() 16:39:53 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:53 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:39:53 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:39:53 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000f80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x168, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x240008c1}, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r6, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:39:53 executing program 2: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:39:53 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:39:53 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:39:53 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:39:53 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000780), 0x80000) 16:40:04 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000d40)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0xfdb9407f8f51a99b}, @xdp={0x2c, 0x6, r2, 0x2e}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x1, 0x7ff}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:04 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) 16:40:04 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) pipe2$9p(&(0x7f0000000780), 0x80000) 16:40:04 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r2 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r2, 0x1, 0xb, &(0x7f00000003c0)=""/4096) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:04 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:04 executing program 1: syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:04 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:04 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d00)={'syztnl0\x00', &(0x7f0000000c80)={'syztnl0\x00', r2, 0x8000, 0x7, 0xffffff5b, 0x37fb6f99, {{0xe, 0x4, 0x2, 0x2e, 0x38, 0x65, 0x0, 0x3, 0xb5f1b1ba3d8b32bc, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x34}, {[@timestamp={0x44, 0x8, 0x87, 0x0, 0x1, [0x8]}, @timestamp={0x44, 0x14, 0x2c, 0x0, 0xb, [0x5, 0xa37, 0xe110, 0x19]}, @generic={0x89, 0x4, "f581"}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:04 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) 16:40:04 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:04 executing program 0: pipe2$9p(&(0x7f0000000780), 0x80000) 16:40:04 executing program 1: syz_open_procfs$userns(0x0, 0x0) 16:40:04 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() semget$private(0x0, 0x4, 0x9b903172c37b6596) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:04 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:04 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:05 executing program 1: syz_open_procfs$userns(0x0, 0x0) 16:40:05 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:05 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c40)={'ip6tnl0\x00', &(0x7f0000000bc0)={'syztnl1\x00', 0x0, 0x0, 0x5, 0x3a, 0x4, 0x38, @remote, @loopback, 0x7, 0x8000, 0x2, 0xfffff801}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:05 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:15 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:15 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:15 executing program 0: pipe2$9p(0x0, 0x80000) 16:40:15 executing program 1: syz_open_procfs$userns(0x0, 0x0) 16:40:15 executing program 6: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:15 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:15 executing program 6: gettid() perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x0, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:15 executing program 0: pipe2$9p(0x0, 0x80000) 16:40:15 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:40:34 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:34 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:34 executing program 1: pipe2$9p(0x0, 0x80000) 16:40:34 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x0, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:34 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:34 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:34 executing program 0: pipe2$9p(0x0, 0x80000) 16:40:34 executing program 2: syz_open_procfs$userns(0x0, 0x0) 16:40:34 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:34 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x0, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:34 executing program 7: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:34 executing program 2: syz_open_procfs$userns(0x0, 0x0) 16:40:34 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240), 0x82800) 16:40:34 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:34 executing program 0: pipe2$9p(&(0x7f0000000780), 0x0) 16:40:35 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:35 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:35 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:35 executing program 7: r0 = gettid() syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:35 executing program 2: syz_open_procfs$userns(0x0, 0x0) 16:40:35 executing program 0: pipe2$9p(&(0x7f0000000780), 0x0) 16:40:47 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:47 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240), 0x82800) 16:40:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:47 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:47 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:47 executing program 7: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:40:47 executing program 0: pipe2$9p(&(0x7f0000000780), 0x0) 16:40:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:47 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:47 executing program 6: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:47 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) pipe2$9p(&(0x7f0000000240), 0x82800) 16:40:59 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:59 executing program 7: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:40:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 16:40:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000200)=0x3ff) 16:40:59 executing program 0: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'gre0\x00', 0x0, 0x80, 0x16, 0x1, 0x7fff, {{0x13, 0x4, 0x0, 0x1, 0x4c, 0x64, 0x0, 0x40, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@rr={0x7, 0xf, 0xcd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x13}, @remote]}, @end, @timestamp={0x44, 0x28, 0x9f, 0x0, 0x1, [0x10000, 0xf75, 0xfff, 0x7, 0x6, 0x20, 0x7fffffff, 0x9, 0x0]}]}}}}}) waitid(0x2, r0, 0x0, 0x1, 0x0) gettid() r3 = semget$private(0x0, 0x4, 0x9b903172c37b6596) semctl$GETPID(r3, 0x1, 0xb, &(0x7f00000003c0)=""/4096) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000014c0)={'syztnl0\x00', &(0x7f0000001400)={'tunl0\x00', 0x0, 0x20, 0x7, 0x80000000, 0xffffffff, {{0x25, 0x4, 0x1, 0x2d, 0x94, 0x65, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@timestamp_addr={0x44, 0xc, 0xbd, 0x1, 0x7, [{@broadcast, 0x8}]}, @noop, @rr={0x7, 0x1f, 0x9a, [@rand_addr=0x64010100, @multicast2, @empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x37}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x1f, 0xa8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @ssrr={0x89, 0x1b, 0xab, [@loopback, @private=0xa010102, @empty, @remote, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x18, 0x87, 0x0, 0x6, [0x80000001, 0x7fff, 0x732, 0x0, 0x1ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001580)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', r2, 0x29, 0x3, 0x7, 0xb47, 0x41, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x700, 0x11, 0x3, 0x100}}) 16:40:59 executing program 4: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:59 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000ac0)={'ip_vti0\x00', &(0x7f0000000a40)={'syztnl0\x00', r2, 0x7d5899cea58a34ce, 0x7, 0x7f, 0x8, {{0xe, 0x4, 0x1, 0x3, 0x38, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @empty, {[@end, @ssrr={0x89, 0x1f, 0xa4, [@multicast2, @private=0xa010101, @loopback, @broadcast, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', r3, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:59 executing program 6: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:59 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:40:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) 16:40:59 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:59 executing program 6: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:40:59 executing program 4: r0 = gettid() syz_open_procfs$userns(r0, &(0x7f0000001840)) 16:40:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:40:59 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:40:59 executing program 7: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x2, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:10 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:10 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) 16:41:10 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:10 executing program 4: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:10 executing program 7: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:10 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:41:10 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:41:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:10 executing program 7: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:10 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:10 executing program 4: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:10 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file2\x00'}) 16:41:10 executing program 7: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:20 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 16:41:20 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) waitid(0x2, r0, 0x0, 0x1, 0x0) 16:41:20 executing program 4: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:20 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:20 executing program 7: r0 = gettid() syz_open_procfs$userns(r0, 0x0) 16:41:20 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:20 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:21 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) wait4(r0, 0x0, 0x1, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:41:21 executing program 4: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:21 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:21 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:21 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:21 executing program 7: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:21 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:21 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:41:21 executing program 7: syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:32 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000880)={'syztnl0\x00', &(0x7f0000000800)={'syztnl1\x00', r2, 0x1, 0x0, 0x3, 0x6, {{0x9, 0x4, 0x1, 0x3, 0x24, 0x67, 0x0, 0x9, 0x4, 0x0, @broadcast, @multicast1, {[@ssrr={0x89, 0x7, 0xa7, [@broadcast]}, @generic={0x1d, 0x7, "c0f6ea30bb"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:32 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:32 executing program 7: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0x0, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:32 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:41:32 executing program 4: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:32 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:32 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:41:32 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:32 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:32 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x29, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0x0, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 4: gettid() syz_open_procfs$userns(0x0, &(0x7f0000001840)) 16:41:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0x0, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:44 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x42, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:41:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x6, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:41:44 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:44 executing program 4: r0 = gettid() syz_open_procfs$userns(r0, 0x0) 16:41:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:44 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:44 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:57 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:57 executing program 2: r0 = gettid() perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x9) 16:41:57 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r1, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:57 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:41:57 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:57 executing program 4: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @initdev}}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xc4, r1, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8040) syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', r2, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:41:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:41:57 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:41:57 executing program 2: r0 = gettid() perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x9) 16:41:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:10 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:42:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 2: r0 = gettid() perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:10 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:42:10 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:10 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1f, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:42:10 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:10 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x2, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:10 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:10 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:42:24 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:42:24 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) r0 = accept(0xffffffffffffffff, &(0x7f0000000380)=@qipcrtr, &(0x7f0000000400)=0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), r0) 16:42:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 7: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:24 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:24 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:35 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:42:35 executing program 1: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)={0x49, 0x29, 0x2, {0x8000, [{{0x10, 0x3, 0x1}, 0x5, 0xe9, 0x7, './file0'}, {{0x4, 0x2, 0x1}, 0x2, 0x1, 0x7, './file0'}]}}, 0x49) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:42:35 executing program 7: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:35 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 4: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:35 executing program 4: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:35 executing program 1: write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000140)) 16:42:35 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 7: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:35 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:42:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:35 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:48 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:42:48 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x2b0, 0x15, 0x4, 0x70bd2c, 0x25dfdbfe, {0x8, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "4ed004134a3ab89b85c09ca27a95498f7f3d716e1f720d283efb94c75c8decc5ff47cbfe42b3a58a0fc68a50448c11218bcb1064abd13213428f1f2cfadf56271f618f3ebe5816b0b97e34fe8381433d8d59cb329fd8ead64136fe73f9b101fea31ad2d9214e00b58a36133d82e23e83413fb777f6202e901a6f018bff26379e1ee4b4f525166aa7a16901214c7bd764ac98f8606cdf0223dcee9b3f0565e7d35990ad0dfa6e8f41393c4bf8d9d6"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "4cce0a412c8f12b264271e8558d4394513c7370606ef59dc1afff7a6b04595f9432bfe843cad99296e3e1b7c50ea2ad8f8381fa1aefbd8c2652e0c604febf3a7220fa251a07489f25897a362de98a0a832774edbe4452a58803a9f04d817a5281217eebc70326cb29eb7773c042f133291cecf79"}, @INET_DIAG_REQ_BYTECODE={0x21, 0x1, "8c47630ceb12452c16a73c5294c2dc51b2e87932933c0d0eb0224e88b5"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "3ac3e5fdb1b20855449a4db9f1bc1385a444bcfe171cb2a7e6dd4d1c32b40bfcb4cb7347831d728c780012f68069dbfdd715ef8a7601cf5600c729a071615af3c6e902037623eee62b80ecdce3d0df92b8e1e3f0d2a4d8dc9e43dd41a50555283e72eb5396d54005daaa6f704b19d6968ad94b832544091c3a"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "9ef3123a4a1f3eb2aa2a6d9ed38eb54dce2f460dddefd1d0c243a7e5dd4065bd4c4010eff16ee905f885a6246c655aff40055f7791b7eb4fbab68f1c733e8a3f0de22b0bd646b9d2c3c9764430a26e25734a2560eac93db272da9067f926ce6c4ad6b9a6c85cd9c875a69bcf84386ffbbbae46756bb79bf05926905d0c5e884c98f9852cf2128b57f4e7458e3bc3b15cf87d4d0e20b54d37c8f1e715e302803b50f612632f0c3f5bad3cad39db08f8b353c8b30d26ed0d2c3916c9449e08a2f4a60e3bc0c1bc"}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x800}, 0x804) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:42:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:48 executing program 1: write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0x0, 0x0) 16:42:48 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:48 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:42:48 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:48 executing program 4: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:42:48 executing program 1: write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0x0, 0x0) 16:42:48 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:00 executing program 1: write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$userns(0x0, 0x0) 16:43:00 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:00 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:00 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:00 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:00 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:00 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:13 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:13 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:13 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:13 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, 0x0) semget$private(0x0, 0x4, 0x2) 16:43:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, 0x0) semget$private(0x0, 0x4, 0x2) 16:43:13 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:13 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:13 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:13 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, 0x0) semget$private(0x0, 0x4, 0x2) 16:43:25 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x804) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:25 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x0, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:25 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:25 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:39 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:39 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:39 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x0, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:39 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:39 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x804) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:39 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x0, 0x3}) semget$private(0x0, 0x4, 0x2) 16:43:40 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:40 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'gretap0\x00', &(0x7f00000008c0)={'gretap0\x00', 0x0, 0x80, 0x7800, 0x4, 0x6, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x4, 0x4, 0x0, @multicast1, @loopback, {[@generic={0x88, 0x10, "2dee700e2be5041f9d8a15ac663d"}, @lsrr={0x83, 0x7, 0xff, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x6f, [@local, @multicast2, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:50 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:43:50 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab}) semget$private(0x0, 0x4, 0x2) 16:43:50 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:43:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:43:51 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab}) semget$private(0x0, 0x4, 0x2) 16:44:02 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:02 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab}) semget$private(0x0, 0x4, 0x2) 16:44:02 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:02 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:02 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:03 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:03 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:03 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:03 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:03 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x0, 0x2) 16:44:03 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:03 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:03 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:15 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:15 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x0, 0x2) 16:44:15 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:15 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:15 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:27 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x0, 0x2) 16:44:27 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x0) 16:44:27 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:27 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:38 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:38 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x0) 16:44:38 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:38 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x109100, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r0, 0x80083314, &(0x7f0000000040)) semtimedop(0xffffffffffffffff, &(0x7f0000000080)=[{0x4, 0xff81, 0x800}, {0x3, 0xce4}, {0x2, 0x3, 0xc00}], 0x3, &(0x7f00000000c0)={0x0, 0x3938700}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000140)={0x23ab, 0x3}) semget$private(0x0, 0x4, 0x0) 16:44:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:38 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:51 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:51 executing program 5: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:44:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:44:51 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:44:51 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 5: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:04 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:04 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:04 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:18 executing program 5: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip_vti0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x10, 0x8, 0xfffffff8, 0x47a1, {{0x7, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@lsrr={0x83, 0x7, 0xa, [@dev={0xac, 0x14, 0x14, 0xb}]}, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x700, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:18 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:18 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa806, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:29 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffff001, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:29 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:30 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:30 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x8000, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:30 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:30 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x3, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xf1, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:55 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x800, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:45:55 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:55 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x2, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:45:55 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:45:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:46:07 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x1, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:07 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:46:07 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:07 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:46:18 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:46:18 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:18 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:18 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:31 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x7, 0xffffffffffffffff, 0x9) 16:46:31 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 16:46:31 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:31 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x65, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:31 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 16:46:44 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 2: gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:46:44 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 2: gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:46:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 16:46:44 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:44 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0xff, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:44 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:46:44 executing program 2: gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x9) 16:46:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:56 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) 16:46:56 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) [ 1740.865463] ------------[ cut here ]------------ [ 1740.865508] [ 1740.865514] ====================================================== [ 1740.865522] WARNING: possible circular locking dependency detected [ 1740.865530] 6.0.0-next-20221006 #1 Not tainted [ 1740.865544] ------------------------------------------------------ [ 1740.865550] syz-executor.2/9096 is trying to acquire lock: [ 1740.865564] ffffffff853fac98 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 1740.865648] [ 1740.865648] but task is already holding lock: [ 1740.865654] ffff88800e07fc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 1740.865711] [ 1740.865711] which lock already depends on the new lock. [ 1740.865711] [ 1740.865718] [ 1740.865718] the existing dependency chain (in reverse order) is: [ 1740.865725] [ 1740.865725] -> #3 (&ctx->lock){....}-{2:2}: [ 1740.865754] _raw_spin_lock+0x2a/0x40 [ 1740.865782] __perf_event_task_sched_out+0x53b/0x18d0 [ 1740.865806] __schedule+0xedd/0x2470 [ 1740.865840] preempt_schedule_common+0x45/0xc0 [ 1740.865876] __cond_resched+0x17/0x30 [ 1740.865909] __mutex_lock+0xa3/0x14d0 [ 1740.865945] __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.865971] do_syscall_64+0x3b/0x90 [ 1740.865993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1740.866024] [ 1740.866024] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 1740.866054] _raw_spin_lock_nested+0x30/0x40 [ 1740.866081] raw_spin_rq_lock_nested+0x1e/0x30 [ 1740.866109] task_fork_fair+0x63/0x4d0 [ 1740.866145] sched_cgroup_fork+0x3d0/0x540 [ 1740.866177] copy_process+0x4183/0x6e20 [ 1740.866200] kernel_clone+0xe7/0x890 [ 1740.866221] user_mode_thread+0xad/0xf0 [ 1740.866244] rest_init+0x24/0x250 [ 1740.866272] arch_call_rest_init+0xf/0x14 [ 1740.866297] start_kernel+0x4c6/0x4eb [ 1740.866318] secondary_startup_64_no_verify+0xe0/0xeb [ 1740.866349] [ 1740.866349] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 1740.866378] _raw_spin_lock_irqsave+0x39/0x60 [ 1740.866405] try_to_wake_up+0xab/0x1930 [ 1740.866434] up+0x75/0xb0 [ 1740.866468] __up_console_sem+0x6e/0x80 [ 1740.866502] console_unlock+0x46a/0x590 [ 1740.866537] con_install+0x14e/0x5d0 [ 1740.866560] tty_init_dev.part.0+0xa0/0x5e0 [ 1740.866589] tty_open+0xba3/0x1350 [ 1740.866614] chrdev_open+0x268/0x6e0 [ 1740.866639] do_dentry_open+0x6ca/0x12b0 [ 1740.866666] path_openat+0x187f/0x27b0 [ 1740.866688] do_filp_open+0x1b6/0x410 [ 1740.866710] do_sys_openat2+0x171/0x4c0 [ 1740.866739] __x64_sys_openat+0x13f/0x1f0 [ 1740.866769] do_syscall_64+0x3b/0x90 [ 1740.866791] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1740.866822] [ 1740.866822] -> #0 ((console_sem).lock){....}-{2:2}: [ 1740.866852] __lock_acquire+0x2a02/0x5e70 [ 1740.866889] lock_acquire+0x1a2/0x530 [ 1740.866923] _raw_spin_lock_irqsave+0x39/0x60 [ 1740.866950] down_trylock+0xe/0x70 [ 1740.866986] __down_trylock_console_sem+0x3b/0xd0 [ 1740.867021] vprintk_emit+0x16b/0x560 [ 1740.867057] vprintk+0x84/0xa0 [ 1740.867092] _printk+0xba/0xf1 [ 1740.867118] report_bug.cold+0x72/0xab [ 1740.867138] handle_bug+0x3c/0x70 [ 1740.867160] exc_invalid_op+0x14/0x50 [ 1740.867182] asm_exc_invalid_op+0x16/0x20 [ 1740.867212] group_sched_out.part.0+0x2c7/0x460 [ 1740.867251] ctx_sched_out+0x8f1/0xc10 [ 1740.867288] __perf_event_task_sched_out+0x6d0/0x18d0 [ 1740.867312] __schedule+0xedd/0x2470 [ 1740.867345] preempt_schedule_common+0x45/0xc0 [ 1740.867381] __cond_resched+0x17/0x30 [ 1740.867414] __mutex_lock+0xa3/0x14d0 [ 1740.867450] __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.867475] do_syscall_64+0x3b/0x90 [ 1740.867497] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1740.867528] [ 1740.867528] other info that might help us debug this: [ 1740.867528] [ 1740.867534] Chain exists of: [ 1740.867534] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 1740.867534] [ 1740.867566] Possible unsafe locking scenario: [ 1740.867566] [ 1740.867571] CPU0 CPU1 [ 1740.867576] ---- ---- [ 1740.867581] lock(&ctx->lock); [ 1740.867593] lock(&rq->__lock); [ 1740.867608] lock(&ctx->lock); [ 1740.867621] lock((console_sem).lock); [ 1740.867634] [ 1740.867634] *** DEADLOCK *** [ 1740.867634] [ 1740.867638] 2 locks held by syz-executor.2/9096: [ 1740.867653] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 1740.867721] #1: ffff88800e07fc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 1740.867779] [ 1740.867779] stack backtrace: [ 1740.867784] CPU: 0 PID: 9096 Comm: syz-executor.2 Not tainted 6.0.0-next-20221006 #1 [ 1740.867812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1740.867825] Call Trace: [ 1740.867832] [ 1740.867840] dump_stack_lvl+0x8b/0xb3 [ 1740.867866] check_noncircular+0x263/0x2e0 [ 1740.867903] ? format_decode+0x26c/0xb50 [ 1740.867941] ? print_circular_bug+0x450/0x450 [ 1740.867978] ? simple_strtoul+0x30/0x30 [ 1740.868015] ? mark_lock.part.0+0xef/0x2f70 [ 1740.868052] ? format_decode+0x26c/0xb50 [ 1740.868093] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 1740.868132] __lock_acquire+0x2a02/0x5e70 [ 1740.868180] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1740.868230] lock_acquire+0x1a2/0x530 [ 1740.868266] ? down_trylock+0xe/0x70 [ 1740.868336] ? lock_release+0x750/0x750 [ 1740.868382] ? vprintk+0x84/0xa0 [ 1740.868421] _raw_spin_lock_irqsave+0x39/0x60 [ 1740.868450] ? down_trylock+0xe/0x70 [ 1740.868488] down_trylock+0xe/0x70 [ 1740.868526] ? vprintk+0x84/0xa0 [ 1740.868563] __down_trylock_console_sem+0x3b/0xd0 [ 1740.868602] vprintk_emit+0x16b/0x560 [ 1740.868643] vprintk+0x84/0xa0 [ 1740.868682] _printk+0xba/0xf1 [ 1740.868710] ? record_print_text.cold+0x16/0x16 [ 1740.868745] ? perf_event_update_userpage+0x4e8/0x7c0 [ 1740.868789] ? report_bug.cold+0x66/0xab [ 1740.868814] ? group_sched_out.part.0+0x2c7/0x460 [ 1740.868855] report_bug.cold+0x72/0xab [ 1740.868881] handle_bug+0x3c/0x70 [ 1740.868905] exc_invalid_op+0x14/0x50 [ 1740.868930] asm_exc_invalid_op+0x16/0x20 [ 1740.868961] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 1740.869006] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 1740.869031] RSP: 0018:ffff88803808f978 EFLAGS: 00010006 [ 1740.869051] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 1740.869068] RDX: ffff888036e09ac0 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 1740.869085] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 1740.869101] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e07fc00 [ 1740.869117] R13: ffff88806ce3f200 R14: ffffffff85238040 R15: 0000000000000002 [ 1740.869141] ? group_sched_out.part.0+0x2c7/0x460 [ 1740.869186] ? group_sched_out.part.0+0x2c7/0x460 [ 1740.869230] ctx_sched_out+0x8f1/0xc10 [ 1740.869273] __perf_event_task_sched_out+0x6d0/0x18d0 [ 1740.869304] ? lock_is_held_type+0xd7/0x130 [ 1740.869338] ? __perf_cgroup_move+0x160/0x160 [ 1740.869362] ? set_next_entity+0x304/0x550 [ 1740.869401] ? update_curr+0x267/0x740 [ 1740.869441] ? lock_is_held_type+0xd7/0x130 [ 1740.869475] __schedule+0xedd/0x2470 [ 1740.869516] ? io_schedule_timeout+0x150/0x150 [ 1740.869552] ? find_held_lock+0x2c/0x110 [ 1740.869589] ? lock_is_held_type+0xd7/0x130 [ 1740.869620] ? __cond_resched+0x17/0x30 [ 1740.869657] preempt_schedule_common+0x45/0xc0 [ 1740.869697] __cond_resched+0x17/0x30 [ 1740.869732] __mutex_lock+0xa3/0x14d0 [ 1740.869772] ? lock_is_held_type+0xd7/0x130 [ 1740.869803] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.869834] ? mutex_lock_io_nested+0x1310/0x1310 [ 1740.869873] ? lock_release+0x3b2/0x750 [ 1740.869911] ? __up_read+0x192/0x730 [ 1740.869944] ? up_write+0x520/0x520 [ 1740.869976] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 1740.870011] __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.870046] ? perf_compat_ioctl+0x130/0x130 [ 1740.870071] ? xfd_validate_state+0x59/0x180 [ 1740.870120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1740.870154] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1740.870192] do_syscall_64+0x3b/0x90 [ 1740.870216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1740.870248] RIP: 0033:0x7f7753db9b19 [ 1740.870267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1740.870290] RSP: 002b:00007f775132f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1740.870314] RAX: ffffffffffffffda RBX: 00007f7753eccf60 RCX: 00007f7753db9b19 [ 1740.870331] RDX: 0000000000000000 RSI: 0000000000000229 RDI: 0000000020000280 [ 1740.870347] RBP: 00007f7753e13f6d R08: 0000000000000009 R09: 0000000000000000 [ 1740.870362] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 1740.870378] R13: 00007ffc2760a33f R14: 00007f775132f300 R15: 0000000000022000 [ 1740.870407] [ 1740.940276] WARNING: CPU: 0 PID: 9096 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 1740.940925] Modules linked in: [ 1740.941153] CPU: 0 PID: 9096 Comm: syz-executor.2 Not tainted 6.0.0-next-20221006 #1 [ 1740.941685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1740.942243] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 1740.942630] Code: 5e 41 5f e9 5b a5 ef ff e8 56 a5 ef ff 65 8b 1d 1b fe ab 7e 31 ff 89 de e8 f6 a1 ef ff 85 db 0f 84 8a 00 00 00 e8 39 a5 ef ff <0f> 0b e9 a5 fe ff ff e8 2d a5 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 1740.943887] RSP: 0018:ffff88803808f978 EFLAGS: 00010006 [ 1740.944264] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 1740.944764] RDX: ffff888036e09ac0 RSI: ffffffff815677b7 RDI: 0000000000000005 [ 1740.945262] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 1740.945765] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e07fc00 [ 1740.946264] R13: ffff88806ce3f200 R14: ffffffff85238040 R15: 0000000000000002 [ 1740.946756] FS: 00007f775132f700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1740.947311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1740.947720] CR2: 00007f7753ecd018 CR3: 000000001d28e000 CR4: 0000000000350ef0 [ 1740.948207] Call Trace: [ 1740.948396] [ 1740.948563] ctx_sched_out+0x8f1/0xc10 [ 1740.948846] __perf_event_task_sched_out+0x6d0/0x18d0 [ 1740.949210] ? lock_is_held_type+0xd7/0x130 [ 1740.949513] ? __perf_cgroup_move+0x160/0x160 [ 1740.949833] ? set_next_entity+0x304/0x550 [ 1740.950132] ? update_curr+0x267/0x740 [ 1740.950414] ? lock_is_held_type+0xd7/0x130 [ 1740.950719] __schedule+0xedd/0x2470 [ 1740.950994] ? io_schedule_timeout+0x150/0x150 [ 1740.951317] ? find_held_lock+0x2c/0x110 [ 1740.951606] ? lock_is_held_type+0xd7/0x130 [ 1740.951912] ? __cond_resched+0x17/0x30 [ 1740.952199] preempt_schedule_common+0x45/0xc0 [ 1740.952534] __cond_resched+0x17/0x30 [ 1740.952806] __mutex_lock+0xa3/0x14d0 [ 1740.953076] ? lock_is_held_type+0xd7/0x130 [ 1740.953382] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.953741] ? mutex_lock_io_nested+0x1310/0x1310 [ 1740.954080] ? lock_release+0x3b2/0x750 [ 1740.954368] ? __up_read+0x192/0x730 [ 1740.954636] ? up_write+0x520/0x520 [ 1740.954897] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 1740.955258] __do_sys_perf_event_open+0x1eec/0x32c0 [ 1740.955610] ? perf_compat_ioctl+0x130/0x130 [ 1740.955923] ? xfd_validate_state+0x59/0x180 [ 1740.956246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1740.956620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1740.956987] do_syscall_64+0x3b/0x90 [ 1740.957253] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1740.957616] RIP: 0033:0x7f7753db9b19 [ 1740.957880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1740.959117] RSP: 002b:00007f775132f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1740.959650] RAX: ffffffffffffffda RBX: 00007f7753eccf60 RCX: 00007f7753db9b19 [ 1740.960159] RDX: 0000000000000000 RSI: 0000000000000229 RDI: 0000000020000280 [ 1740.960667] RBP: 00007f7753e13f6d R08: 0000000000000009 R09: 0000000000000000 [ 1740.961160] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 1740.961664] R13: 00007ffc2760a33f R14: 00007f775132f300 R15: 0000000000022000 [ 1740.962174] [ 1740.962348] irq event stamp: 186 [ 1740.962592] hardirqs last enabled at (185): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 1740.963232] hardirqs last disabled at (186): [] __schedule+0x1225/0x2470 [ 1740.963817] softirqs last enabled at (182): [] __irq_exit_rcu+0x11b/0x180 [ 1740.964412] softirqs last disabled at (133): [] __irq_exit_rcu+0x11b/0x180 [ 1740.965003] ---[ end trace 0000000000000000 ]--- 16:46:56 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) 16:46:56 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:46:56 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:46:56 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 3: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x36, 0x4, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0x71, 0x0, [{0x2, 0xd, "83cfdb77a8553eb53d258f"}, {0x2, 0x12, "e39b15bf9dabce22db2570948fa0df14"}, {0x0, 0x7, "14140fc692"}, {0x2, 0x10, "37150914a52e74be7e8cf16f1770"}, {0x1, 0xb, "606a4d427057e31a41"}, {0x2, 0xb, "fbb8ded184b99e61ec"}, {0x7, 0x7, "e07fd3559e"}, {0x1, 0x3, '/'}, {0x6, 0xd, "0972de0a83299f3297d902"}, {0x7, 0x8, "048ca08afd67"}]}, @timestamp_addr={0x44, 0x4c, 0x56, 0x1, 0xf, [{@broadcast, 0xffffffff}, {@local, 0x3f}, {@multicast1, 0x7ff}, {@multicast1, 0x8b43}, {@rand_addr=0x64010102, 0x6432}, {@private=0xa010102, 0x7}, {@local, 0x817b}, {@rand_addr=0x64010101}, {@rand_addr=0x64010101, 0x6}]}]}}}}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000001440), 0xffffffffffffffff) 16:47:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 7: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 6: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x9) 16:47:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 1: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x198, 0x0, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5eca121b, 0x2, @perf_config_ext={0xfff, 0x10001}, 0x198, 0xffffffffffffffff, 0x7fffffff, 0x8, 0x9, 0x7, 0xf846, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 4: perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 16:47:05 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x7, 0xffffffffffffffff, 0x0) 16:47:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf846, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) VM DIAGNOSIS: 16:46:56 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff823c077c RDI=ffffffff8765c9e0 RBP=ffffffff8765c9a0 RSP=ffff88803808f368 R8 =0000000000000004 R9 =0000000000000010 R10=0000000000000010 R11=0000000000000001 R12=0000000000002710 R13=0000000000000020 R14=fffffbfff0ecb98c R15=dffffc0000000000 RIP=ffffffff823c07d1 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f775132f700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7753ecd018 CR3=000000001d28e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f7753ea07c000007f7753ea07c8 XMM02=00007f7753ea07e000007f7753ea07c0 XMM03=00007f7753ea07c800007f7753ea07c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000003 RBX=0000000000000001 RCX=1ffffffff0e0c4d8 RDX=0000000000000004 RSI=ffff888036927780 RDI=0000000000000001 RBP=ffff888036920000 RSP=ffff8880369272f8 R8 =ffffffff85ee81f2 R9 =ffffffff85ee81f6 R10=ffffed1006d24e7e R11=ffff8880369273c8 R12=ffff8880369273c9 R13=ffff8880369273e8 R14=ffff888036927388 R15=0000000000000007 RIP=ffffffff812046c5 RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1235abf1f0 CR3=000000001d2e8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=756e696c2d34365f3638782f62696c2f XMM01=6461657268747062696c2f756e672d78 XMM02=00302e6f732e6461657268747062696c XMM03=2f756e672d78756e696c2d34365f3638 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000