88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x4, 0x1, 0xf9, 0x81, 0x0, 0x800000000, 0x20080, 0x10, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000004c0), 0xc}, 0x100, 0x6, 0x800, 0x9, 0x800, 0x3, 0x3, 0x0, 0x7, 0x0, 0x80000001}, r2, 0x10, 0xffffffffffffffff, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:17 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x207}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x8020) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r0, 0x4b888ddf3db4ac98, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20008084) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xa28d}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000680), r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:17 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004095}, 0x4000) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004800}, 0x20000811) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:17 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(0xffffffffffffffff, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 22:45:17 executing program 5: clock_gettime(0x0, &(0x7f0000003b40)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003b80)={0x0, 0x0}) 22:45:17 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 5: clock_gettime(0x0, &(0x7f0000003b40)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003b80)={0x0, 0x0}) 22:45:17 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 5: clock_gettime(0x0, &(0x7f0000003b40)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003b80)={0x0, 0x0}) 22:45:17 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(0xffffffffffffffff, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 22:45:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x4, 0x1, 0xf9, 0x81, 0x0, 0x800000000, 0x20080, 0x10, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000004c0), 0xc}, 0x100, 0x6, 0x800, 0x9, 0x800, 0x3, 0x3, 0x0, 0x7, 0x0, 0x80000001}, r2, 0x10, 0xffffffffffffffff, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:17 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004095}, 0x4000) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004800}, 0x20000811) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:17 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r2, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r4, 0x2, r0, 0x7, 0x80000}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r5, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) r6 = syz_open_dev$mouse(&(0x7f0000000640), 0x8, 0x74a03) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r6, 0x40082102, &(0x7f0000000680)=r1) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r3, r3, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x207}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x8020) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r0, 0x4b888ddf3db4ac98, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20008084) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xa28d}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:17 executing program 5: clock_gettime(0x0, &(0x7f0000003b40)) 22:45:17 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:17 executing program 5: clock_gettime(0x0, 0x0) 22:45:17 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(0xffffffffffffffff, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 22:45:18 executing program 5: clock_gettime(0x0, 0x0) 22:45:18 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004095}, 0x4000) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004800}, 0x20000811) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r4, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) syz_open_dev$mouse(&(0x7f0000000640), 0x8, 0x74a03) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:31 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r4, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:31 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004095}, 0x4000) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004800}, 0x20000811) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x4, 0x1, 0xf9, 0x81, 0x0, 0x800000000, 0x20080, 0x10, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000004c0), 0xc}, 0x100, 0x6, 0x800, 0x9, 0x800, 0x3, 0x3, 0x0, 0x7, 0x0, 0x80000001}, r2, 0x10, 0xffffffffffffffff, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:31 executing program 5: clock_gettime(0x0, 0x0) 22:45:31 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:31 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x207}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x8020) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r0, 0x4b888ddf3db4ac98, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20008084) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:31 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:45:31 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:31 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004095}, 0x4000) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x207}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x8020) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:46 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.stat\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:45:46 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x37ed, 0x8001, 0x3, 0x20}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:46 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb8, r0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000004}, 0x900) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:45:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x305, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:59 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:59 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:59 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:45:59 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:45:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:45:59 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:45:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:45:59 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:00 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:11 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:11 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:11 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:11 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:11 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:11 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:11 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:11 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:11 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x3, 0xfc000000, 0x9, 0x1}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:23 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000340)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:23 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:23 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:23 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={r3, 0x2, r0, 0x7, 0x80000}) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:23 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:23 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:23 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:23 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:23 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:23 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:23 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:24 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:24 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:24 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:24 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:24 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:24 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:24 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:24 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:36 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a80)={0xfffffffb, 0x9b, "6006b70cab1d5b910a3fcb7f0b70293cfebd6fe3b1772bb1057467a72a97148e3a3c59b95415384b50aca552b00c41310c51b86d09bb316befb77ac6f4cffd4340c156d54e8c04f4a646ca7b89630c5808251aa2f5f31662d911922c3e52faa3e5c2989b9f83577ae6e6875c39a53ae4c696cb3f75a60b9efeb2895e674bf9c53d4df2e65e44529eaacfca684e1fd7d3ffd379ed46119d7ea702c3"}) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:46:36 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:36 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x10000000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:36 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000240)={0x1, 0x0, 'client1\x00', 0x0, "bc20525435fab860", "272b225c0bf0826cfe6ab9ce9c25223d4907b1d43d33ad980cd939ef88e13db5", 0x7}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:36 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:36 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can={0x1d, r2}, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:46:36 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:36 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:36 executing program 6: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:37 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:46:51 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x3ff, 0x2, 'client0\x00', 0xffffffff80000001, "6ef98402439765a3", "20fc71b2361ebe38acec9dc4a0df69b7fd65a9c2a01b5d4bea3015ec50793a4b", 0x30, 0x7}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:46:51 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:46:51 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:46:51 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:46:51 executing program 4: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:03 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:03 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:03 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:47:03 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 5: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 6: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:03 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:16 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:16 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:16 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:16 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:16 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:16 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'ip6tnl0\x00', r1, 0x29, 0x2, 0xe0, 0x100, 0x1, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x40, 0x0, 0x7}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', r2, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r4, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r4, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r4) 22:47:16 executing program 6: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:16 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:17 executing program 6: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:17 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:17 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:17 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:17 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(0x0, 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:17 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:47:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:17 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:17 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:17 executing program 4: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:31 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000000)={0x6, 0x2, 'client0\x00', 0x1, "38dc5a11e0f55fb4", "e6efd01d7dd0d4e9da70d51388fcd8083d309c6133b141a3dfeac5f22078e023", 0x400}) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:31 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(0x0, 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:31 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:31 executing program 4: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:31 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:47:32 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:32 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:32 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:32 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(0x0, 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:32 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:47:46 executing program 4: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0x0, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:46 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:46 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @local}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004080) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:47:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:46 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0x0, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:46 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r3, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r3, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r3) 22:47:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:46 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:47 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:58 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:58 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:58 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0x0, 0x200000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:58 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:58 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:58 executing program 1: get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:58 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r2, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r2, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r2) 22:47:58 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:59 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:59 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:47:59 executing program 7: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, r0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, r0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r2, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r2, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r2) 22:47:59 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:59 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:47:59 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:47:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:47:59 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:48:10 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:10 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:10 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:10 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:10 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:10 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:10 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000e00), 0xffffffffffffffff) 22:48:10 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:11 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:26 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:26 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:26 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:26 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:26 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:26 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:26 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:27 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:27 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:27 executing program 1: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:27 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:27 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x2800, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:41 executing program 1: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:41 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:41 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:41 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:41 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:41 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:41 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:41 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:41 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:42 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:42 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:42 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:42 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:42 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:42 executing program 1: get_thread_area(0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:42 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:42 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0xc8, &(0x7f0000000200)={[{0xc, 0x4e00, "efaafda6656d7f4c847dd6a0"}, {0x10, 0x4e00, "e56a1193e938ff653cfcb5147d8176ee"}, {0x8f, 0x4e00, "df0fad99fad877a591ca8e42d6b761d9fbf82d789f95ff9fbd13031c66994f10a1f2077866dae5cf8d8a41ae8a4195678f2f887d0aa9e3cb2359a1a7903a6bb02291d3beeff00168694f38f78397cee92e51bfb7ca574d1ebf873a357b8a7aef56d1b59ef058f4dd98e694ac6de5bb1540a20f1ea68367687d6425be67b19a7dc12b11e5d8e4081b89b71d2c328f42"}, {0xc, 0x4e00, "6c7b0c4a82aaf6734cb03482"}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:57 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000d80), 0xffffffff, 0x200000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:57 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:57 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:57 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:57 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:57 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:57 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:57 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:58 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:58 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:58 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:58 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:58 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:58 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:48:58 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:48:58 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:48:58 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:48:58 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:48:58 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:12 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:49:12 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:12 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:12 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:12 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:12 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:12 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed, 0x8}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:13 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:13 executing program 3: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500), 0xffffffffffffffff) syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:27 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:27 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe2(&(0x7f00000025c0), 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:49:27 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x0, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:27 executing program 3: syz_genetlink_get_family_id$smc(&(0x7f0000000a40), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:27 executing program 3: syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:40 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:49:40 executing program 3: syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:40 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:40 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:40 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 3: syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 22:49:40 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:40 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:40 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0xb, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:40 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x80000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:49:41 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:41 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:41 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:41 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:41 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:54 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:49:54 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:49:54 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:49:54 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:49:54 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:05 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:05 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:05 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:05 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:50:05 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:05 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:05 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:05 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) 22:50:05 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:06 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:06 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) 22:50:06 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:06 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:06 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:06 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:17 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:50:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:17 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) 22:50:17 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 22:50:17 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:17 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:17 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x0, 0x300) 22:50:31 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) socket$packet(0x11, 0x0, 0x300) 22:50:31 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:50:31 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:31 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) socket$packet(0x11, 0x0, 0x300) 22:50:32 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:32 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:32 executing program 3: socket$packet(0x11, 0x0, 0x300) 22:50:46 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000680)={0x67446698, 0x1, 0x3, 0x1, 0x1, "9c798694b643337803bfaf507a0a1bf0c840636fe380a5185d176732ee38bce789e71718ded3415542bc7bdb54ca5a6164edce2d624ff76ee556f76c556f12eac7a7fd075e1f021c7b9fa27d6d55062ba6006cea642c2373a5da6c7c7a1b56bf2076d719591a4c40b3a1967b03c3745877af38df22d74097ec609dcde0638d54364b7d1b364f524815ea750596817264ed4b9bd372d2d8fdda22960b0706713a01b367999c56330ffd8941791c10f8195c636a37dd20a31b"}, 0xc8) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:46 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:50:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:46 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:47 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0], 0x3, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:50:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:50:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:50:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0], 0x3, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0], 0x3, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:50:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0xfeea}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:13 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:13 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:13 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:13 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:13 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000780), 0x19, 0x800) 22:51:13 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:13 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:13 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x0) 22:51:14 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r0, r0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:14 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:14 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:14 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x19, 0x800) 22:51:14 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:14 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) 22:51:14 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:14 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:14 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) pipe2(0x0, 0x0) 22:51:27 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:27 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) 22:51:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x19, 0x800) 22:51:27 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:51:27 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) 22:51:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:28 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:51:28 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:28 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:28 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:51:28 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x800) 22:51:39 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x800) 22:51:39 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:39 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:39 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:39 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) 22:51:39 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:39 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:39 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:40 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:40 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:51:40 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:40 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:40 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:51:40 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:51:40 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:40 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:40 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) 22:51:40 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:40 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:52 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x8040, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000640)) write$nbd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) 22:51:52 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:51:52 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:52 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:51:52 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:51:52 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(0x0, 0x0) 22:51:52 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:52 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x3, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:52 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:51:52 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:51:52 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:51:52 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:51:52 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:51:52 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:05 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:05 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:05 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x3, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:05 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:52:05 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:05 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:52:05 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:05 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:05 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:52:25 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 22:52:25 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:52:25 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:25 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2, {r0}}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:25 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:25 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:25 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:25 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:25 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:52:26 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:52:26 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:26 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:26 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:52:26 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r1, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r1, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r1) 22:52:26 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:52:26 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:26 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:52:26 executing program 0: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:26 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:26 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:39 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:39 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:52:39 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:39 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), 0xffffffffffffffff) pipe2(0x0, 0x0) 22:52:39 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:39 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:39 executing program 0: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:39 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 0: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:52:51 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:51 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:52:51 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) 22:52:51 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:51 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:51 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) 22:52:51 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:51 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:52:51 executing program 3: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:52:51 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:06 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:06 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:06 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:06 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:06 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) 22:53:06 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:06 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:06 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:07 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(0x0, 0x0) 22:53:07 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) 22:53:07 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:07 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(0x0, 0x0) 22:53:07 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) 22:53:07 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(0x0, 0x0) 22:53:07 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:07 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:18 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000440)={'some', 0x20, 0x9e4, 0x20, 0x6}, 0x2f) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) 22:53:18 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:19 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:19 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:31 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:53:31 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:31 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:31 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:31 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:31 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:53:31 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:31 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:45 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:45 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) 22:53:45 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:45 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:45 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:45 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:53:45 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:45 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 22:53:58 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:58 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', 0x0}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:58 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:58 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:53:58 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:58 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:53:58 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:53:58 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:53:58 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', 0x0}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:53:58 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:54:11 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:11 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', 0x0}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:11 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 22:54:11 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:11 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:11 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:11 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:11 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:54:11 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:11 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:11 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:11 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:11 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:54:11 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:54:11 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x0, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:25 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 22:54:25 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x0, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:25 executing program 2: clone3(0x0, 0x0) 22:54:25 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:54:25 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:25 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:25 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:25 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:25 executing program 2: clone3(0x0, 0x0) 22:54:25 executing program 2: clone3(0x0, 0x0) 22:54:25 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:25 executing program 2: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:25 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(0x0, 0x0) 22:54:25 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r3, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:25 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x0, 0x7, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:25 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:38 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff], 0x3}, 0x58) 22:54:38 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:38 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 2: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:38 executing program 2: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:38 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff], 0x3}, 0x58) 22:54:38 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:38 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:38 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:38 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:38 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:38 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:39 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:52 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:52 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:52 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:52 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:52 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff], 0x3}, 0x58) 22:54:52 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x0, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:54:52 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:52 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:52 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0x0], 0x3}, 0x58) 22:54:53 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:54:53 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:54:53 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:54:53 executing program 0: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:54:53 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:06 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x0, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:06 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:06 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:55:06 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:06 executing program 0: clone3(0x0, 0x0) 22:55:06 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:55:06 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:06 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:06 executing program 0: clone3(0x0, 0x0) 22:55:06 executing program 0: clone3(0x0, 0x0) 22:55:06 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:55:06 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:55:06 executing program 0: clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:55:06 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:06 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:06 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x0, 0x8001, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:06 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:55:06 executing program 0: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, 0x0}, 0x58) 22:55:18 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x0, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0, 0x0], 0x3}, 0x58) 22:55:18 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:18 executing program 0: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:55:18 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:55:18 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x0, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:32 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0, 0x0], 0x3}, 0x58) 22:55:32 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:32 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:55:32 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0, 0x0], 0x3}, 0x58) 22:55:32 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:55:32 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x0, 0x69, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:32 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:55:32 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:32 executing program 3: clone3(0x0, 0x0) 22:55:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:33 executing program 3: clone3(0x0, 0x0) 22:55:33 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:33 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) 22:55:33 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:55:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:55:46 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:46 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:46 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) 22:55:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:46 executing program 3: clone3(0x0, 0x0) 22:55:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, 0x0], 0x2}, 0x58) 22:55:46 executing program 3: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:46 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) 22:55:46 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:46 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 22:55:46 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:55:46 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x0, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x0, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:55:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:59 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:59 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:55:59 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 22:55:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:55:59 executing program 3: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:59 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, r1, 0x0], 0x3}, 0x58) 22:55:59 executing program 3: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:55:59 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 22:56:14 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, r1, 0x0], 0x3}, 0x58) 22:56:14 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x0, 0x80, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:56:14 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:14 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:14 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:14 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:56:14 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r2, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:14 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:56:15 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140)=0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, r1, 0x0], 0x3}, 0x58) 22:56:15 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:15 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:56:15 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:15 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:15 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) 22:56:15 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:15 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:56:15 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:56:15 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:15 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:15 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:15 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:27 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:27 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x0, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:56:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:56:27 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 22:56:27 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:27 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000480)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:27 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:27 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:40 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:40 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:40 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 22:56:40 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:40 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x0, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:56:40 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:40 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000480)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:40 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:40 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:40 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) 22:56:40 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:40 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:40 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:40 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000480)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:40 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:41 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, r1, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:41 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:41 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 22:56:41 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x0, 0x5}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:56:41 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:41 executing program 3: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:56:41 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:52 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) 22:56:52 executing program 3: clone3(0x0, 0x0) 22:56:52 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:56:52 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:52 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:56:52 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:56:52 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 22:56:52 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:05 executing program 3: clone3(0x0, 0x0) 22:57:05 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:05 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:05 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:05 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:57:05 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0, 0x0, {r0}}, 0x58) 22:57:05 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0, 0x0], 0x2}, 0x58) 22:57:05 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:05 executing program 3: clone3(0x0, 0x0) 22:57:06 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:06 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:57:06 executing program 3: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:06 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[0x0], 0x1}, 0x58) 22:57:06 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:06 executing program 0: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:06 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ec0), 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:06 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:57:06 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:19 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:19 executing program 3: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:19 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:19 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:19 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:19 executing program 2: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 22:57:19 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:19 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:19 executing program 3: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:20 executing program 5: clone3(0x0, 0x0) 22:57:20 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:20 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:20 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:33 executing program 5: clone3(0x0, 0x0) 22:57:33 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:33 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:33 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:33 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:33 executing program 2: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:33 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:33 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:34 executing program 5: clone3(0x0, 0x0) 22:57:34 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:34 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:34 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:34 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:34 executing program 2: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:34 executing program 5: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:34 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:34 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:34 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:34 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:34 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:34 executing program 2: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:57:34 executing program 5: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:46 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:46 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:46 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:46 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:46 executing program 5: clone3(&(0x7f00000003c0)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:46 executing program 2: clone3(0x0, 0x0) 22:57:46 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), 0xffffffffffffffff) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:46 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 2: clone3(0x0, 0x0) 22:57:59 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:59 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) write$cgroup_pressure(r0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:59 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000140), {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:59 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:59 executing program 2: clone3(0x0, 0x0) 22:57:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:57:59 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:57:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, &(0x7f0000000600)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:57:59 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:57:59 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:57:59 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:57:59 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:58:00 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:14 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, &(0x7f0000000600)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:14 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:58:14 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:14 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:58:14 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:14 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:58:14 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:58:14 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:14 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:58:14 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:58:14 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:14 executing program 3: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:58:14 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:14 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:14 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000580)=@caif, &(0x7f0000000600)=0x80) 22:58:15 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:15 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:30 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:30 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:30 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:30 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, &(0x7f0000000100), 0x0, {}, &(0x7f0000000180)=""/118, 0x76, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:58:30 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x7, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:30 executing program 3: clone3(&(0x7f0000000b00)={0x20045000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:58:30 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:30 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:31 executing program 3: clone3(0x0, 0x0) 22:58:31 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:31 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:31 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(0x0, 0x0) 22:58:31 executing program 3: clone3(0x0, 0x0) 22:58:31 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:43 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:58:43 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:43 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:43 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:43 executing program 3: clone3(0x0, 0x0) 22:58:43 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:43 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:43 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(0x0, 0x0) 22:58:43 executing program 3: clone3(&(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)}, 0x58) 22:58:43 executing program 3: clone3(&(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:58:43 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(0x0, 0x0) 22:58:43 executing program 3: clone3(&(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:58:43 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:43 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(0x0, 0x0) 22:58:43 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:58:43 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:43 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 3: clone3(&(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:58:59 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:58:59 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, &(0x7f0000000600)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:58:59 executing program 3: clone3(&(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:59:00 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:00 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:00 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:15 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:15 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:15 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 6: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:15 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:29 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 6: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) 22:59:29 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:29 executing program 6: clone3(0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 22:59:29 executing program 6: clone3(0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:29 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:59:30 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) 22:59:30 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:30 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:30 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:30 executing program 6: clone3(0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:30 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 22:59:43 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:59:43 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:43 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:43 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:43 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) 22:59:43 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) 22:59:43 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:43 executing program 0: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) [ 1242.416018] cgroup: fork rejected by pids controller in /syz1 22:59:43 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) 22:59:43 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:44 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:44 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:44 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 22:59:44 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:44 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:44 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:44 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) 22:59:56 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 22:59:56 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:56 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:56 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:56 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) 22:59:56 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 22:59:56 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:56 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 22:59:56 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:08 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:08 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:08 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) 23:00:08 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:08 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:08 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:08 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:08 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:08 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) 23:00:08 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:21 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) 23:00:21 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(0x0, 0x0) 23:00:22 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:22 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:22 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:22 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:22 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(0x0, 0x0) 23:00:22 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) 23:00:22 executing program 6: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(0x0, 0x0) 23:00:22 executing program 5: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:22 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(0x0, 0x0) 23:00:22 executing program 2: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:22 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:00:22 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:22 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) 23:00:22 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:22 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:22 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) 23:00:22 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:22 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(0x0, 0x0) 23:00:22 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:00:38 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:00:38 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:38 executing program 2: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:38 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:38 executing program 6: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:38 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:38 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:38 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:00:53 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, 0x0) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:53 executing program 5: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:53 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:53 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:00:53 executing program 2: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:53 executing program 6: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:53 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:53 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) 23:00:53 executing program 5: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone3(0x0, 0x0) 23:00:53 executing program 2: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) 23:00:53 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:00:53 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 23:00:53 executing program 6: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:00:53 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, 0x0) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:00:53 executing program 2: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 23:00:53 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:00:53 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:53 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:00:53 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) 23:00:53 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 23:01:07 executing program 2: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 23:01:07 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:07 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:01:07 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) 23:01:07 executing program 6: openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:01:07 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 23:01:07 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:07 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, 0x0) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:01:08 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 23:01:08 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:08 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:08 executing program 2: openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 23:01:08 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:08 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:01:08 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:01:08 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) [ 1326.917855] cgroup: fork rejected by pids controller in /syz6 23:01:08 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:08 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:21 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:21 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:21 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:21 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:21 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, &(0x7f0000001280)) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:01:21 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) 23:01:21 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:21 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:01:21 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:21 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:21 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:33 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:01:33 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:33 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:01:33 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:33 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:33 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:01:33 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:33 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, 0x0, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:01:33 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:01:33 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:01:33 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:33 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, 0x0, &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:33 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:50 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, r0) 23:01:50 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:50 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:01:50 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 23:01:50 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:01:50 executing program 3: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:50 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:01:50 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:01:50 executing program 3: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:50 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:01:50 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, r0) 23:01:50 executing program 3: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:01:50 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:02:04 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:04 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) 23:02:04 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:02:04 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:04 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:02:04 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, r0) 23:02:04 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 23:02:04 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:04 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:04 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:02:04 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 23:02:04 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:04 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:02:04 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:04 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:04 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:18 executing program 0: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:02:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:18 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:02:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, 0x0}, 0x58) 23:02:18 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:18 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 23:02:18 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:18 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:19 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:19 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:19 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:02:19 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) 23:02:19 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:19 executing program 7: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000011c0)) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), 0xffffffffffffffff) 23:02:19 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 23:02:19 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:19 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:02:19 executing program 5: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 23:02:19 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x20000884) 23:02:32 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) 23:02:32 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:02:32 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 23:02:32 executing program 0: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) 23:02:32 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:02:32 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:32 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:02:32 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 23:02:32 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:33 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) 23:02:33 executing program 3: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) 23:02:33 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 0: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 5: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(0x0, 0x0) 23:02:50 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0x0], 0x3}, 0x58) 23:02:50 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 5: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(0x0, 0x0) 23:02:50 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:02:50 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:02:50 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0x0], 0x3}, 0x58) 23:03:04 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), 0x0, {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 5: clone3(&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(0x0, 0x0) 23:03:04 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) 23:03:04 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0], 0x2}, 0x58) 23:03:04 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:03:04 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 23:03:04 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0], 0x2}, 0x58) 23:03:04 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, 0x0, 0x0, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:03:04 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, r1, 0xffffffffffffffff, 0x0], 0x5, {r0}}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:04 executing program 5: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 23:03:18 executing program 5: clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, 0x0}, 0x58) 23:03:18 executing program 2: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 0: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:03:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0], 0x2}, 0x58) 23:03:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 3: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 6: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 5: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x4000) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000a00)={0x0, @rc={0x1f, @fixed}, @generic={0x0, "f43d9762371459a75216ba500111"}, @can, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000e80)={'ip6tnl0\x00', &(0x7f0000000e00)={'sit0\x00', 0x0, 0x4, 0x0, 0x61, 0x8001, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7, 0x0, 0x7}}) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0x48000, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000f00), 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x3c, 0x0, 0xd18, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000001100)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x20000884) getpeername(r0, &(0x7f0000001140)=@nl=@unspec, &(0x7f00000011c0)=0x80) accept(r0, &(0x7f0000001200)=@ll, &(0x7f0000001280)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000001440), r0) 23:03:18 executing program 7: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 4: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), 0x0, &(0x7f0000000940), {0x20}, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 23:03:18 executing program 1: get_thread_area(&(0x7f0000000000)={0x0, 0x20001000, 0x1000, 0x1, 0x3, 0x1}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) clone3(&(0x7f00000003c0)={0x10100000, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, &(0x7f0000000200)=""/199, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) clone3(&(0x7f0000000b00)={0x20045000, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[0x0, 0x0], 0x2}, 0x58) 23:03:18 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f00000003c0)={0x10100000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0xd}, &(0x7f0000000180)=""/118, 0x76, &(0x7f0000000200)=""/199, &(0x7f0000000380)=[0xffffffffffffffff, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000b00)={0x0, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940), {0x20}, &(0x7f0000000980)=""/72, 0x48, &(0x7f0000000a00)=""/136, &(0x7f0000000ac0)=[r2, r2, 0xffffffffffffffff, 0x0], 0x4}, 0x58) [ 1457.909849] ================================================================== [ 1457.910362] BUG: KASAN: use-after-free in __lock_acquire+0x42c9/0x5e70 [ 1457.910796] Read of size 8 at addr ffff888037a3a018 by task syz-executor/15369 [ 1457.911233] [ 1457.911346] CPU: 1 PID: 15369 Comm: syz-executor Not tainted 6.1.0-rc7-next-20221129 #1 [ 1457.911833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1457.912324] Call Trace: [ 1457.912490] [ 1457.912637] dump_stack_lvl+0x8f/0xb7 [ 1457.912889] print_report+0x175/0x478 [ 1457.913134] ? __lock_acquire+0x42c9/0x5e70 [ 1457.913409] kasan_report+0xbf/0x1c0 [ 1457.913654] ? __lock_acquire+0x42c9/0x5e70 [ 1457.913931] __lock_acquire+0x42c9/0x5e70 [ 1457.914207] ? __pfx_mark_lock.part.0+0x10/0x10 [ 1457.914504] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 1457.914823] ? __pfx___lock_acquire+0x10/0x10 [ 1457.915108] ? __switch_to+0x5c3/0xee0 [ 1457.915369] lock_acquire+0x1a6/0x530 [ 1457.915618] ? kmemleak_scan+0x1a0/0x1600 [ 1457.915885] ? __pfx_lock_acquire+0x10/0x10 [ 1457.916160] ? __call_rcu_common.constprop.0+0x589/0xa40 [ 1457.916503] ? __call_rcu_common.constprop.0+0x589/0xa40 [ 1457.916844] ? lockdep_hardirqs_on+0x7d/0x100 [ 1457.917130] ? _raw_spin_lock_irq+0x45/0x50 [ 1457.917403] _raw_spin_lock_irq+0x36/0x50 [ 1457.917669] ? kmemleak_scan+0x1a0/0x1600 [ 1457.917933] kmemleak_scan+0x1a0/0x1600 [ 1457.918203] ? __pfx_kmemleak_scan+0x10/0x10 [ 1457.918488] ? strncpy_from_user+0x107/0x500 [ 1457.918777] kmemleak_write+0x574/0x680 [ 1457.919033] ? __pfx_kmemleak_write+0x10/0x10 [ 1457.919323] ? debugfs_file_get+0x1d2/0x450 [ 1457.919599] ? __pfx_debugfs_file_get+0x10/0x10 [ 1457.919898] full_proxy_write+0x121/0x190 [ 1457.920164] vfs_write+0x358/0xe40 [ 1457.920401] ? __pfx_full_proxy_write+0x10/0x10 [ 1457.921225] ? __pfx_vfs_write+0x10/0x10 [ 1457.921772] ? lock_release+0x3b6/0x750 [ 1457.922596] ? __up_read+0x192/0x730 [ 1457.923089] ? handle_mm_fault+0x43d/0xae0 [ 1457.923662] ? __pfx___up_read+0x10/0x10 [ 1457.923931] ? __fget_light+0x212/0x280 [ 1457.924188] ksys_write+0x12b/0x260 [ 1457.924432] ? __pfx_ksys_write+0x10/0x10 [ 1457.924707] ? syscall_enter_from_user_mode+0x21/0x50 [ 1457.925034] ? syscall_enter_from_user_mode+0x21/0x50 [ 1457.925366] do_syscall_64+0x3f/0x90 [ 1457.925616] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1457.925949] RIP: 0033:0x7fd192cb25c3 [ 1457.926199] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 1457.927285] RSP: 002b:00007fff8037ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1457.927756] RAX: ffffffffffffffda RBX: 00007fff8037d0a8 RCX: 00007fd192cb25c3 [ 1457.928228] RDX: 0000000000000004 RSI: 00007fd192d68ed9 RDI: 0000000000000003 [ 1457.928693] RBP: 0000000000000002 R08: 00000000000005b1 R09: 00007fff803ef080 [ 1457.929155] R10: 00007fff803ef090 R11: 0000000000000246 R12: 00000000fffffff6 [ 1457.929629] R13: 00007fff8037eef1 R14: 0000000000000000 R15: 0000000000163db0 [ 1457.930117] [ 1457.930284] [ 1457.930409] Allocated by task 100: [ 1457.930653] kasan_save_stack+0x22/0x50 [ 1457.930925] kasan_set_track+0x25/0x30 [ 1457.931195] __kasan_slab_alloc+0x5c/0x70 [ 1457.931485] kmem_cache_alloc+0x1e1/0x410 [ 1457.931768] __create_object+0x3d/0xc10 [ 1457.932041] kmem_cache_alloc+0x273/0x410 [ 1457.932324] __alloc_file+0x21/0x240 [ 1457.932583] alloc_empty_file+0x71/0x170 [ 1457.932863] path_openat+0xd4/0x29b0 [ 1457.933119] do_filp_open+0x1ba/0x410 [ 1457.933391] do_sys_openat2+0x171/0x4c0 [ 1457.933674] __x64_sys_openat+0x143/0x200 [ 1457.933958] do_syscall_64+0x3f/0x90 [ 1457.934230] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1457.934588] [ 1457.934709] Freed by task 13: [ 1457.934919] kasan_save_stack+0x22/0x50 [ 1457.935194] kasan_set_track+0x25/0x30 [ 1457.935461] kasan_save_free_info+0x2e/0x50 [ 1457.935769] __kasan_slab_free+0x10a/0x190 [ 1457.936065] kmem_cache_free+0xfb/0x610 [ 1457.936336] rcu_core+0x7cf/0x2070 [ 1457.936580] __do_softirq+0x1c7/0x8f9 [ 1457.936844] [ 1457.936966] Last potentially related work creation: [ 1457.937289] kasan_save_stack+0x22/0x50 [ 1457.937566] __kasan_record_aux_stack+0x95/0xb0 [ 1457.937885] __call_rcu_common.constprop.0+0x6a/0xa40 [ 1457.938224] kmem_cache_free+0xc1/0x610 [ 1457.938482] rcu_core+0x7cf/0x2070 [ 1457.938712] __do_softirq+0x1c7/0x8f9 [ 1457.938958] [ 1457.939070] Second to last potentially related work creation: [ 1457.939427] kasan_save_stack+0x22/0x50 [ 1457.939690] __kasan_record_aux_stack+0x95/0xb0 [ 1457.939992] __call_rcu_common.constprop.0+0x6a/0xa40 [ 1457.940326] kmem_cache_free+0xc1/0x610 [ 1457.940582] putname+0x102/0x140 [ 1457.940808] do_sys_openat2+0x157/0x4c0 [ 1457.941063] __x64_sys_openat+0x143/0x200 [ 1457.941332] do_syscall_64+0x3f/0x90 [ 1457.941586] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1457.941914] [ 1457.942027] The buggy address belongs to the object at ffff888037a3a000 [ 1457.942027] which belongs to the cache kmemleak_object of size 368 [ 1457.942860] The buggy address is located 24 bytes inside of [ 1457.942860] 368-byte region [ffff888037a3a000, ffff888037a3a170) [ 1457.943665] [ 1457.943792] The buggy address belongs to the physical page: [ 1457.944192] page:0000000027238e49 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37a3a [ 1457.944855] head:0000000027238e49 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0 [ 1457.945505] anon flags: 0x100000000010200(slab|head|node=0|zone=1) [ 1457.945962] raw: 0100000000010200 ffff88800844f780 ffffea0000a0fd00 dead000000000003 [ 1457.946519] raw: 0000000000000000 0000000000120012 00000001ffffffff 0000000000000000 [ 1457.947068] page dumped because: kasan: bad access detected [ 1457.947457] [ 1457.947589] Memory state around the buggy address: [ 1457.947937] ffff888037a39f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.948454] ffff888037a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1457.948967] >ffff888037a3a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1457.949494] ^ [ 1457.949789] ffff888037a3a080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1457.950308] ffff888037a3a100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 1457.950822] ================================================================== [ 1457.951332] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 23:03:19 Registers: info registers vcpu 0 RAX=ffffffff8440ef20 RBX=ffffffff854328c0 RCX=ffffffff843ef912 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000000 RSP=ffffffff85407e20 R8 =0000000000000001 R9 =ffff88806ce34f03 R10=ffffed100d9c69e0 R11=0000000000000001 R12=fffffbfff0a86518 R13=ffffffff85d06610 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff8440ef2f RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe1f68f10000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe1f68f0e000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb1729cb344 CR3=000000001015c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffff000000000000ff00000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=000000323d524f4e494d00373d524f4a XMM05=3d5145534b534944006b7369643d4550 XMM06=3d454d414e56454400303d444955555f XMM07=59534255530032706f6f6c2f6b636f6c XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000033 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8247fb55 RDI=ffffffff87fb1ae0 RBP=ffffffff87fb1aa0 RSP=ffff888010c2f1e8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000033 R11=0000000000000001 R12=0000000000000033 R13=ffffffff87fb1aa0 R14=0000000000000010 R15=ffffffff8247fb40 RIP=ffffffff8247fbad RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556748400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe006859f000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe006859d000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff5898cc48 CR3=00000000397fa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000010ffffffff00005618a7bddc50 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=323d44455a494c414954494e495f4345 XMM05=3d5145534b534944006b7369643d4550 XMM06=3d454d414e56454400303d444955555f XMM07=59534255530036706f6f6c2f6b636f6c XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000