Warning: Permanently added '10.128.0.65' (ED25519) to the list of known hosts. 1970/01/01 00:00:40 fuzzer started 1970/01/01 00:00:40 dialing manager at 10.128.0.163:30013 syzkaller login: [ 40.588398][ T4228] cgroup: Unknown subsys name 'net' [ 40.678683][ T4234] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k SSFS [ 40.820137][ T4228] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:00:41 starting 5 executor processes [ 41.710243][ T4250] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 41.722228][ T4258] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 41.725289][ T4258] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 41.726095][ T4259] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 41.727452][ T4258] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 41.729754][ T4259] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 41.732192][ T4258] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 41.733225][ T4260] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 41.735939][ T4258] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 41.737820][ T4260] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 41.738563][ T4258] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 41.740451][ T4260] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 41.743103][ T4258] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 41.744718][ T4260] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 41.746542][ T4258] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 41.747652][ T4260] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 41.751543][ T4261] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 41.755208][ T4260] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 41.759240][ T4260] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 41.762926][ T4260] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 41.765865][ T4261] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 41.768023][ T4260] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 41.770296][ T4260] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 41.770317][ T4258] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 41.905793][ T4246] chnl_net:caif_netlink_parms(): no params data found [ 41.996883][ T4252] chnl_net:caif_netlink_parms(): no params data found [ 42.023711][ T4246] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.025979][ T4246] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.028672][ T4246] device bridge_slave_0 entered promiscuous mode [ 42.035046][ T4246] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.037071][ T4246] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.039636][ T4246] device bridge_slave_1 entered promiscuous mode [ 42.067379][ T4249] chnl_net:caif_netlink_parms(): no params data found [ 42.072484][ T4246] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.085390][ T4246] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.100400][ T4251] chnl_net:caif_netlink_parms(): no params data found [ 42.128627][ T4252] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.130588][ T4252] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.133087][ T4252] device bridge_slave_0 entered promiscuous mode [ 42.142352][ T4246] team0: Port device team_slave_0 added [ 42.145688][ T4246] team0: Port device team_slave_1 added [ 42.156921][ T4252] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.159017][ T4252] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.161506][ T4252] device bridge_slave_1 entered promiscuous mode [ 42.179642][ T4246] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.181586][ T4246] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.189288][ T4246] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.208181][ T4246] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.210127][ T4246] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.217494][ T4246] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.222288][ T4252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.227341][ T4252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.251255][ T4249] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.253341][ T4249] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.256064][ T4249] device bridge_slave_0 entered promiscuous mode [ 42.266160][ T4251] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.268185][ T4251] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.270829][ T4251] device bridge_slave_0 entered promiscuous mode [ 42.275306][ T4252] team0: Port device team_slave_0 added [ 42.277092][ T4251] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.279044][ T4251] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.281689][ T4251] device bridge_slave_1 entered promiscuous mode [ 42.284921][ T4249] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.286843][ T4249] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.289211][ T4249] device bridge_slave_1 entered promiscuous mode [ 42.292718][ T4252] team0: Port device team_slave_1 added [ 42.337241][ T4251] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.340203][ T4252] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.342109][ T4252] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.349555][ T4252] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.385493][ T4246] device hsr_slave_0 entered promiscuous mode [ 42.424024][ T4246] device hsr_slave_1 entered promiscuous mode [ 42.465708][ T4249] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 42.469314][ T4251] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.473224][ T4249] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 42.476298][ T4252] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.478242][ T4252] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.485889][ T4252] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.513710][ T4251] team0: Port device team_slave_0 added [ 42.521560][ T4249] team0: Port device team_slave_0 added [ 42.531701][ T4251] team0: Port device team_slave_1 added [ 42.535665][ T4249] team0: Port device team_slave_1 added [ 42.605169][ T4252] device hsr_slave_0 entered promiscuous mode [ 42.643906][ T4252] device hsr_slave_1 entered promiscuous mode [ 42.683701][ T4252] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 42.686179][ T4252] Cannot create hsr debugfs directory [ 42.695655][ T4251] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.697516][ T4251] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.704762][ T4251] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.717519][ T4249] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 42.719491][ T4249] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.729746][ T4249] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 42.736135][ T4251] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.738019][ T4251] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.748684][ T4251] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.754817][ T4249] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 42.756832][ T4249] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 42.764316][ T4249] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 42.865441][ T4251] device hsr_slave_0 entered promiscuous mode [ 42.924042][ T4251] device hsr_slave_1 entered promiscuous mode [ 42.963863][ T4251] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 42.966114][ T4251] Cannot create hsr debugfs directory [ 43.055384][ T4249] device hsr_slave_0 entered promiscuous mode [ 43.103942][ T4249] device hsr_slave_1 entered promiscuous mode [ 43.143792][ T4249] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 43.145940][ T4249] Cannot create hsr debugfs directory [ 43.247183][ T4246] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 43.298764][ T4246] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 43.345792][ T4246] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 43.395429][ T4246] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 43.455950][ T4252] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 43.485898][ T4252] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 43.545139][ T4252] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 43.586349][ T4252] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 43.661926][ T4249] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 43.705041][ T4249] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 43.737597][ T4249] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 43.774341][ T4258] Bluetooth: hci0: command tx timeout [ 43.777037][ T4251] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 43.827575][ T4249] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 43.864030][ T4247] Bluetooth: hci1: command tx timeout [ 43.865746][ T4247] Bluetooth: hci3: command tx timeout [ 43.867348][ T4247] Bluetooth: hci2: command tx timeout [ 43.886080][ T4251] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 43.925933][ T4251] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 43.968875][ T4251] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 44.068182][ T4246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.077261][ T4252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.091864][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.095691][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.102130][ T4246] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.112331][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.117340][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.119901][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.122153][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.134723][ T4252] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.137073][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.139738][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.142561][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.146437][ T4282] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.148443][ T4282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.150677][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.153460][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.156722][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.159110][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.161402][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.165316][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.171566][ T4249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.187926][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.190576][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.193276][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.197120][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.199967][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.218758][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.221553][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.225548][ T4284] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.227629][ T4284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.229903][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.232407][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.238003][ T4246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.242019][ T4249] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.262486][ T4251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.266819][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.269341][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.271786][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.279634][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.282310][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.285141][ T4284] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.287356][ T4284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.289625][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.292502][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.299505][ T4284] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.301461][ T4284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.303906][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.306608][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.316163][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.319119][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.321848][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.334072][ T4284] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.336096][ T4284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.338509][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.341294][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.344537][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.347701][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.360686][ T4252] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 44.363643][ T4252] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 44.380619][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.383357][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.388282][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.390825][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.393337][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.396298][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.398830][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.401636][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.405354][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.408082][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.410751][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.419869][ T4251] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.434353][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.436965][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.439371][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.443153][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.446704][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.449335][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.451876][ T4241] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.454079][ T4241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.461224][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.464050][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.466657][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.469258][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.471897][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 44.479367][ T4249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.493868][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.496439][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.498999][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.501001][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.503222][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.508000][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.510922][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.514346][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.517016][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.520235][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.544539][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.547296][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.554635][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.557307][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.559929][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.563173][ T4251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.580459][ T4246] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.598514][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.600655][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.626415][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.629100][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.641622][ T4246] device veth0_vlan entered promiscuous mode [ 44.659723][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.662806][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.666431][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.669395][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.677054][ T4246] device veth1_vlan entered promiscuous mode [ 44.707427][ T4246] device veth0_macvtap entered promiscuous mode [ 44.709919][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 44.712444][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.715883][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.718522][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.721451][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.737492][ T4246] device veth1_macvtap entered promiscuous mode [ 44.755032][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.757515][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.759665][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.779440][ T4252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.793032][ T4246] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 44.800140][ T4247] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 44.800299][ T4246] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.810306][ T4260] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 44.812949][ T4260] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 44.815498][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.818202][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.820860][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.823402][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.831523][ T4246] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.835474][ T4246] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.837997][ T4246] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.838476][ T4260] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 44.840611][ T4246] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.842889][ T4260] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 44.853284][ T4260] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 44.870053][ T4251] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.880718][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.882920][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.924825][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 44.926961][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 44.929094][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.931694][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.939208][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.941905][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.947961][ T4249] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.985135][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.988043][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.991221][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.998579][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.002294][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.007142][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.021041][ T4252] device veth0_vlan entered promiscuous mode [ 45.031884][ T4251] device veth0_vlan entered promiscuous mode [ 45.035764][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.038366][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.056241][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.058729][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.061246][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.064462][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.064740][ T218] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.068403][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.071122][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.076348][ T218] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.082219][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 45.088014][ T4251] device veth1_vlan entered promiscuous mode [ 45.094903][ T4249] device veth0_vlan entered promiscuous mode [ 45.095564][ T55] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.098736][ T55] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.100314][ T4249] device veth1_vlan entered promiscuous mode [ 45.112136][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 45.115586][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 45.118045][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 45.147110][ T4252] device veth1_vlan entered promiscuous mode [ 45.173510][ T4251] device veth0_macvtap entered promiscuous mode [ 45.181383][ T4249] device veth0_macvtap entered promiscuous mode [ 45.184477][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.187285][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.190051][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.192701][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.201922][ T4251] device veth1_macvtap entered promiscuous mode [ 45.209014][ T4249] device veth1_macvtap entered promiscuous mode [ 45.221145][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.224327][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.226924][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.229403][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.238604][ T4252] device veth0_macvtap entered promiscuous mode [ 45.242136][ T4251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 45.247585][ T4251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000340)) sendmsg$inet6(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) close(r0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, 0x1c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r2, 0x0) tkill(r1, 0x401004000000016) [ 45.251346][ T4251] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.257341][ T4249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 45.260084][ T4249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.262618][ T4249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x5a) [ 45.279649][ T4249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.288864][ T4249] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.303257][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.306679][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.309277][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.312084][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.321236][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x6, 0x23, &(0x7f0000000000)={@empty}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) sendto$inet(r0, &(0x7f00000002c0)="46bf5ccdf52e57fe19802c924af558c0648c39a2a1ed5a8d8b8dcaf736388031b9c9edcbb77b5f55bb8ee0be56a1f22e319bc8084b2f672fe392c63782497aa6e4ab0a62bc2f89a024a837bc4b0b10ba6c3437c6db75db6a54f7a8ccf39159036723bd4b", 0x64, 0x2400c004, &(0x7f0000000240)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x205, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) socket$inet(0x2, 0x0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmmsg(r1, &(0x7f0000005e40)=[{{&(0x7f0000001e40)=@ieee802154, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000004a00)=[{&(0x7f0000003980)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f0000004a40)=""/59, 0x3b}, 0x1f}, {{&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004dc0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000004cc0)=""/235, 0xeb}], 0x4}}], 0x3, 0x0, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 45.324337][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.327160][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.330677][ T4252] device veth1_macvtap entered promiscuous mode [ 45.339129][ T4251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.341961][ T4251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.361898][ T4251] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.374532][ T4249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.377670][ T4249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.380359][ T4249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.383114][ T4249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.388711][ T4249] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.397635][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.400379][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.403158][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.406448][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.409094][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.416684][ T4251] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.419188][ T4251] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.421642][ T4251] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.430234][ T4251] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.446870][ T4249] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.449154][ T4249] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.451546][ T4249] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.459939][ T4249] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.469466][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 45.472360][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.476004][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 45.479030][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.482009][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 45.486144][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.490402][ T4252] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.504713][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.507335][ T1512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.534837][ T4304] chnl_net:caif_netlink_parms(): no params data found [ 45.571987][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.576801][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.579410][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.582356][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.585795][ T4252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 45.588650][ T4252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.592317][ T4252] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.612327][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.615530][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.620079][ T4252] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.622499][ T4252] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.625032][ T4252] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.627555][ T4252] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.656666][ T4304] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.659411][ T4304] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.662101][ T4304] device bridge_slave_0 entered promiscuous mode [ 45.678605][ T4304] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.680717][ T4304] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.684277][ T4304] device bridge_slave_1 entered promiscuous mode [ 45.696645][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.698819][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.727689][ T4304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.730461][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 45.747648][ T4304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.753965][ T218] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.756288][ T218] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.769957][ T4285] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 45.816909][ T4304] team0: Port device team_slave_0 added [ 45.819307][ T55] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.824980][ T437] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.825645][ T55] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.827189][ T437] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.842164][ T55] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.842866][ T4285] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 45.847167][ T4285] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 45.850018][ T55] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 45.850320][ T4304] team0: Port device team_slave_1 added [ 45.854292][ T4258] Bluetooth: hci0: command tx timeout [ 45.886544][ T4304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.888558][ T4304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.901164][ T4304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.907230][ T4304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.909196][ T4304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.918067][ T4304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.922891][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 45.931901][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 45.934684][ T4260] Bluetooth: hci2: command tx timeout [ 45.936429][ T4260] Bluetooth: hci3: command tx timeout [ 45.937931][ T4260] Bluetooth: hci1: command tx timeout [ 45.957566][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x0) setgid(r1) executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$TIOCMBIC(r0, 0x5450, 0x0) [ 46.001585][ T4282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 0: prctl$PR_GET_THP_DISABLE(0x18) [ 46.041090][ T4304] device hsr_slave_0 entered promiscuous mode executing program 0: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5451, 0x0) [ 46.074138][ T4304] device hsr_slave_1 entered promiscuous mode [ 46.095199][ T4304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.097473][ T4304] Cannot create hsr debugfs directory executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x8906) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0) [ 46.246890][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000240), 0xc) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000200)=0x5, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) [ 46.309214][ T4304] netdevsim netdevsim4 netdevsim0: renamed from eth0 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$VT_RESIZEX(r0, 0x5450, 0x0) [ 46.336897][ T4304] netdevsim netdevsim4 netdevsim1: renamed from eth1 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x802c2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4004662b, &(0x7f0000000000)={@desc={0x1, 0x3d, @desc3}}) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDSKBMETA(r0, 0x8904, &(0x7f0000000040)) [ 46.377566][ T4304] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 46.407177][ T4304] netdevsim netdevsim4 netdevsim3: renamed from eth3 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x5452, &(0x7f0000000000)) executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x5a) [ 46.542696][ T4304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.555362][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.557901][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.567394][ T4304] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.592428][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.595723][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0x5450, 0x0) [ 46.604394][ T4325] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.606550][ T4325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.620181][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x17) [ 46.625647][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.629200][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.631741][ T4325] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.633713][ T4325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.637227][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.639968][ T4325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.666992][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.670079][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.672629][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.680120][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.686377][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x40, 0x11) r2 = fcntl$dupfd(r0, 0x0, r1) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x1) [ 46.691493][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.698998][ T4304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.706919][ T4304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x5451, 0x0) [ 46.726423][ T4357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.729095][ T4357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.731703][ T4357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x6, 0x23, &(0x7f0000000000)={@empty}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) sendto$inet(r0, &(0x7f00000002c0)="46bf5ccdf52e57fe19802c924af558c0648c39a2a1ed5a8d8b8dcaf736388031b9c9edcbb77b5f55bb8ee0be56a1f22e319bc8084b2f672fe392c63782497aa6e4ab0a62bc2f89a024a837bc4b0b10ba6c3437c6db75db6a54f7a8ccf39159036723bd4b", 0x64, 0x2400c004, &(0x7f0000000240)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x205, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) socket$inet(0x2, 0x0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmmsg(r1, &(0x7f0000005e40)=[{{&(0x7f0000001e40)=@ieee802154, 0x80, &(0x7f00000020c0)=[{0x0}], 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000004a00)=[{&(0x7f0000003980)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f0000004a40)=""/59, 0x3b}, 0x1f}, {{&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004dc0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000004cc0)=""/235, 0xeb}], 0x4}}], 0x3, 0x0, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/dmi', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\b\a\x00'}) executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000100)={@loopback, @private}, &(0x7f0000000140)=0x8) executing program 1: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RGETLOCK(r0, 0x0, 0x34) close(r0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000010c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 46.899420][ T4258] Bluetooth: hci4: command tx timeout executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) write$FUSE_STATFS(r1, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000180)=0x7) executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x5450, 0x0) executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x802c2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4004662b, &(0x7f0000000000)={@desc={0x1, 0x3d, @desc3}}) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x5a) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) close_range(r0, r0, 0x0) socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x5450, 0x0) [ 47.169383][ T4304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.172812][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.175908][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x400000d) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) readv(r0, 0x0, 0x0) executing program 3: pipe2$watch_queue(0x0, 0xb82e336200000000) r0 = mq_open(&(0x7f0000001140)='MBWU\t\"Z\xaf\x00\x00\x00\bCiz(Pjw\xadb\xf8\xa0\x01rp\xb7\xb8\xe6\xb6\xbc\xe4r\xc0\r,', 0x840, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='auxv\x00') dup3(r0, r1, 0x0) accept4$unix(r1, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r1, &(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) dup3(r0, r2, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) executing program 3: write$tcp_congestion(0xffffffffffffffff, 0x0, 0xffffffffffffff27) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x5451, 0x0) executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1089008, 0x0) mount$9p_xen(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x801021, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x5450, 0x0) executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') ioctl$F2FS_IOC_RESIZE_FS(r0, 0x5452, &(0x7f00000020c0)) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, 0x0, 0x0) executing program 0: r0 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) dup3(r0, r2, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000140), 0x0) [ 47.520111][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) dup3(r2, r3, 0x0) accept(r3, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 3: r0 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x5452, &(0x7f0000000040)) [ 47.612832][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.619498][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.639570][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.642391][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.645641][ T4304] device veth0_vlan entered promiscuous mode executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x802c2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4004662b, &(0x7f0000000000)={@desc={0x1, 0x3d, @desc3}}) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) [ 47.665027][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.669402][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.690689][ T4304] device veth1_vlan entered promiscuous mode executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) [ 47.728663][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.731377][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.739661][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x46040, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5421, &(0x7f0000000380)={0x0, 'ip6_vti0\x00'}) [ 47.755339][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.760801][ T4304] device veth0_macvtap entered promiscuous mode [ 47.767740][ T4304] device veth1_macvtap entered promiscuous mode [ 47.805046][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.807747][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.810487][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.813192][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.825585][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 1: r0 = eventfd2(0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x5451, 0x0) executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/dmi', 0x0, 0x0) dup3(r0, r1, 0x0) write$tun(r1, 0x0, 0x0) [ 47.843843][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.846699][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.849439][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x5450, 0x0) [ 47.876271][ T4304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.884459][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.887017][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.889597][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.892342][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) [ 47.912537][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.915855][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.920901][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.934414][ T4258] Bluetooth: hci0: command tx timeout executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCGETS(r0, 0x5451, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5450, 0x0) [ 47.955332][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.958025][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.960921][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.964266][ T4304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.967286][ T4304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.971631][ T4304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.977970][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.980950][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.987519][ T4304] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.990126][ T4304] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.997867][ T4304] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.000096][ T4304] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.014417][ T4260] Bluetooth: hci1: command tx timeout [ 48.015957][ T4260] Bluetooth: hci3: command tx timeout [ 48.017426][ T4260] Bluetooth: hci2: command tx timeout executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000140)) [ 48.052537][ T4299] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.055427][ T4299] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.066820][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 48.081570][ T4299] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.084676][ T4299] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, 0x0, 0x0) [ 48.096756][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 1: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RSTAT(r1, 0x0, 0x0) executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netlink\x00') ioctl$VT_RESIZEX(r0, 0x5451, 0x0) executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept(r0, 0x0, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) executing program 4: pivot_root(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000840)='./file0\x00') executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000240)='.pending_reads\x00', 0x802c2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0x4004662b, &(0x7f0000000000)={@desc={0x1, 0x3d, @desc3}}) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb}, 0xfffffe6a) executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual', 0x0, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/133) executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5450, 0x0) executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x31, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000000)=0x1e) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$sock(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.pending_reads\x00', 0x181841, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x5452, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5450, 0x0) executing program 4: r0 = memfd_create(&(0x7f0000000400)='\x00', 0x0) flock(r0, 0x8) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PIO_CMAP(r0, 0x541b, &(0x7f0000000040)) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x541b, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PIO_FONT(r0, 0x5450, 0x0) executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x5450, 0x0) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000006440), 0x2, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$KDDELIO(r2, 0x541b, 0x2040000d) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$TUNSETVNETBE(r0, 0x5421, &(0x7f0000000080)) executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = dup(r0) ioctl$TUNGETFILTER(r1, 0x5450, 0x0) executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xffffffb2) write$P9_RGETLOCK(r0, 0x0, 0x0) executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) r1 = dup(r0) getsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f0000000000)=""/53, &(0x7f0000000040)=0x35) executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fadvise64(r0, 0x0, 0x0, 0x0) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000040)) executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x5450, 0x0) executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5450, 0x0) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5450, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r3, 0x5451) executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) write$P9_RVERSION(r0, 0x0, 0x0) executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VT_RELDISP(r0, 0x5450) [ 48.974807][ T4258] Bluetooth: hci4: command tx timeout executing program 1: fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='\xff-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x02d\xee\xa9\x8bcc\xad\x89\x9ck\xde\x05\x00\x00\x00UE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\x88\x00\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0xffa8) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r1, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) ioctl$TUNSETVNETLE(r1, 0x5452, &(0x7f0000000080)) executing program 0: socket$unix(0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x1000000a, 0x3, 0x0) r0 = mq_open(&(0x7f0000000940)='trusted.overlay.nlink\x00', 0x40, 0x0, 0x0) ioctl$KDSKBENT(r0, 0x5452, &(0x7f0000000040)) executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x86442, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x5451, 0x0) executing program 2: r0 = timerfd_create(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x5450, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_IOCTL(r0, 0x0, 0x0) executing program 1: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$FIBMAP(r0, 0x5450, 0x0) executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x5451, 0x0) executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) write$FUSE_IOCTL(r0, 0x0, 0x0) executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) r2 = dup3(r0, r1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5450, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r1, &(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) dup3(r0, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r3, &(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, 0x0, 0x0) executing program 3: openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\xff-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x00\x00\x00\x00\xee\xa9\x8bcc\xad\x89\x9ck\xde\x05\x00\x00\x00UE\x06\x00\x00\x00\xfb\xcc\x97\xb4\v\xa9=\xcdJx3\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\x88\x00\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x145\x10H\x88s_\xfeG.\x933\xe6v\xa4k\xd7\xa9\x9c\x02\xd7e\x8b&\xec>\xfe|\xcf\x85w(\xdf\b\x0e\x8e\x10:\'.\xe9t\xf8\xf9\xbe\x9d \x11\xa3DX\x03\xae\xd7\xc5\x8dM\xd0\x7fT\x95k\x17\x9b\xb6\xf6]z8\x9f\xe4\x8e\xc6o<\x04\xe5\xe1\x00\xe9\xefn\xd4\xa5\xf1\xf9\xdc\xf3?U}\bU\xa1\x94\xcesQ\xc1,\x81~\xe1\xd5\x7f\xaex7L\xc3\v\x13\xb2\xc3,\x7f\x9d\xa2\xc9\xdf\x14v\xa1\x12Tr\xe4\xfaFUi\xd2np\xe6%\xf1\xd8*\x00%\x81z\xdf\xf8\x10\xbe\xa6[\ro\x95\xe0\xe0\x9a\x139Q\x9a^\x93)\xe9*\xfb\xad.\xb2u2\xf2\xc6\x122}S\x8c5\xa5/\xcd\x11\xf6\xae\xb07\xe8(\xd7&c\x16\x9eR\xe2\fHUR4\xed\x8188\x9f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8a\x15\xbc\x9bF\xd5cZx\xc8\xb3mB', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0xffa8) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5451, 0x0) executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5451, 0x0) executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) executing program 4: semget(0x3, 0x4, 0x2a8) socket$inet_tcp(0x2, 0x1, 0x0) r0 = memfd_create(&(0x7f0000000300)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00]\xd8\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88u\xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6\xff\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x100000c, 0x11, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8000007) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$NS_GET_OWNER_UID(r1, 0x8901, &(0x7f0000000040)) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x5451, 0x0) executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x5452, &(0x7f0000000000)) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x5452, &(0x7f0000000000)) executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x540e, 0x0) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001c40), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000000)) executing program 3: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$packet_tx_ring(r2, 0xb11, 0xd, 0x0, 0x0) executing program 2: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x5450, 0x0) executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x80341, 0x0) write$binfmt_misc(r0, 0x0, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) setxattr$incfs_metadata(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x22, &(0x7f0000000000)=0x2, 0x4) executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$TUNDETACHFILTER(r0, 0x8903, 0x20000000) executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @remote}, &(0x7f00000000c0)=0xc) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) fcntl$getflags(r3, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x8906, 0x0) executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) close_range(r0, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r1, r0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0x5450, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x2, @remote}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0xfffffff8, @mcast2}, 0x1c) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r2, 0x5452, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r3 = inotify_init1(0x0) ioctl$FITRIM(r3, 0x5452, &(0x7f0000000000)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@rand_addr=0x64010102, @in6=@loopback, 0x4e21, 0x6, 0x4e21, 0x7f, 0x8, 0xa0, 0x0, 0x2b}, {0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x3, 0xffffffffffffffff, 0xfffffffffffffff9}, {0x0, 0x400}, 0x0, 0x0, 0x2, 0x0, 0x3, 0x2}, {{@in=@private, 0x4d5, 0xcd}, 0x2, @in=@broadcast, 0x3500, 0x4, 0x4, 0x80, 0x8, 0x80, 0x8}}, 0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) [ 49.833130][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, 0x0) executing program 3: r0 = epoll_create1(0x0) fcntl$notify(r0, 0x10, 0x0) executing program 2: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x8906, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x20000000) executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r0, 0x88, 0x5, 0x0, 0x0) [ 50.014240][ T4258] Bluetooth: hci0: command tx timeout executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fchownat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) [ 50.071493][ T4258] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 50.075911][ T4258] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 50.078454][ T4258] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 50.081485][ T4258] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 50.084205][ T4258] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 50.086718][ T4258] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 50.094459][ T4260] Bluetooth: hci2: command tx timeout [ 50.095394][ T4247] Bluetooth: hci1: command tx timeout [ 50.097976][ T4258] Bluetooth: hci3: command tx timeout executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5450, 0x0) executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000039c0), 0x0, 0x0) dup3(r0, r1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x43, 0x0, &(0x7f0000000040)) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x3d) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) [ 50.303311][ T4606] chnl_net:caif_netlink_parms(): no params data found [ 50.356264][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5450, 0x0) executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x88, 0x21, 0x0, 0x0) executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x5451, 0x0) socket$inet(0x2, 0x2, 0x0) r1 = mq_open(&(0x7f0000000040)='%^+{\x00', 0x40, 0x0, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000001140)) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$KDSKBENT(0xffffffffffffffff, 0x5452, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, 0x0) fchown(r2, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001240)={{}, 0x0, 0x6, @inherit={0x70, &(0x7f00000011c0)=ANY=[@ANYBLOB]}, @name="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"}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) getegid() signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f00000028c0)={0x2, 0x0, 0x401}) [ 50.561373][ T4260] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 50.564713][ T4260] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 50.567357][ T4260] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 50.570175][ T4260] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 50.578324][ T4260] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 50.580747][ T4260] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 50.675122][ T437] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: timer_create(0x0, &(0x7f0000000780)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RAUTH(r0, 0x0, 0x0) close(r0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = gettid() socket$packet(0x11, 0x2, 0x300) tkill(r1, 0x401004000000016) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x5450, 0x0) executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_FIOGETOWN(r0, 0x8910, &(0x7f0000003fc0)) [ 50.728913][ T437] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = gettid() r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = dup3(r2, r1, 0x0) accept4$inet(r3, 0x0, 0x0, 0x0) tkill(r0, 0x7) executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = fcntl$dupfd(r0, 0x0, r1) dup3(r2, r1, 0x0) fgetxattr(r1, &(0x7f00000003c0)=@known='trusted.overlay.upper\x00', 0x0, 0x0) executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 50.821606][ T4606] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.824001][ T4606] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.826759][ T4606] device bridge_slave_0 entered promiscuous mode executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, 0x0, 0x0) [ 50.856603][ T437] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) fchown(r1, 0x0, 0xee00) [ 50.890104][ T4606] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.892195][ T4606] bridge0: port 2(bridge_slave_1) entered disabled state executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r0, r2, 0x0) preadv2(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 50.902827][ T4606] device bridge_slave_1 entered promiscuous mode executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x541b, &(0x7f0000000080)) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setflags(r0, 0x6, 0x0) [ 50.960243][ T437] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$inet6(r2, &(0x7f0000000040), 0xffffffffffffffff, 0x80000) executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x5450, 0x0) [ 51.034430][ T4606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.056076][ T4254] Bluetooth: hci4: command tx timeout [ 51.072541][ T4606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, 0x0, 0x0) [ 51.123948][ T4606] team0: Port device team_slave_0 added [ 51.127467][ T4606] team0: Port device team_slave_1 added executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x5450, 0x0) [ 51.168880][ T4636] chnl_net:caif_netlink_parms(): no params data found [ 51.184101][ T4606] batman_adv: batadv0: Adding interface: batadv_slave_0 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0xd, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000180)=0x78) [ 51.186328][ T4606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.194893][ T4606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.224093][ T4606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.226510][ T4606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x5450, 0x0) [ 51.243203][ T4606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet(r0, &(0x7f0000004140)={&(0x7f0000003ac0)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x0) executing program 0: semctl$GETNCNT(0xffffffffffffffff, 0x2, 0x3, &(0x7f0000000240)=""/253) [ 51.386212][ T4606] device hsr_slave_0 entered promiscuous mode [ 51.414033][ T4606] device hsr_slave_1 entered promiscuous mode executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f00000000c0)) ioctl$int_in(r0, 0x5421, &(0x7f0000000500)) executing program 0: pipe2$9p(&(0x7f0000002780)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x5450, 0x0) [ 51.455334][ T4606] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 51.459806][ T4606] Cannot create hsr debugfs directory [ 51.465059][ T4636] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.467187][ T4636] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.469820][ T4636] device bridge_slave_0 entered promiscuous mode [ 51.523080][ T4636] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.525168][ T4636] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.527794][ T4636] device bridge_slave_1 entered promiscuous mode executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000080)) executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x5450, 0x0) [ 51.616220][ T4636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.627135][ T4636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.678387][ T4636] team0: Port device team_slave_0 added executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$tcp_congestion(r0, &(0x7f0000000080)='yeah\x00', 0x5) [ 51.699335][ T4636] team0: Port device team_slave_1 added executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TCGETS(r2, 0x5450, 0x0) [ 51.789883][ T4636] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.794664][ T4636] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. executing program 4: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5451, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xc, 0x8000006}, 0x8) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000380)={0x2, 0x2, @remote}, 0x10) close(r0) clock_gettime(0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000140)) close(0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) [ 51.831812][ T4636] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.865877][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 51.870880][ T4636] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.873003][ T4636] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.890825][ T4636] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 0: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) close(r0) socket$inet(0x10, 0x3, 0x0) write$binfmt_script(r0, 0x0, 0x0) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x5421, &(0x7f0000000000)) executing program 3: prctl$PR_GET_FPEXC(0x18, 0x0) [ 52.001204][ T4713] Zero length message leads to an empty skb executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000640)="2784969ebff02a12", 0x8) [ 52.035395][ T4636] device hsr_slave_0 entered promiscuous mode executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) [ 52.095763][ T4636] device hsr_slave_1 entered promiscuous mode executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5451, 0x0) executing program 4: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000540)) [ 52.125214][ T4636] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 52.127373][ T4636] Cannot create hsr debugfs directory [ 52.183792][ T4260] Bluetooth: hci5: command tx timeout executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x60002, 0x0) write$P9_RREADDIR(r0, 0x0, 0xfec6) executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, 0x0, 0x0) executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x5452, &(0x7f0000000000)) executing program 3: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$KIOCSOUND(r0, 0x5451, 0x0) executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) ioctl$EXT4_IOC_GETFSUUID(r0, 0x5451, 0x0) executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0, 0x0, 0x0, 0x19}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x8903, &(0x7f0000000000)={'sit0\x00', 0x0}) executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$BTRFS_IOC_SEND(r1, 0x5450, 0x0) executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) close(r0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000125c0), 0x0, 0x0, 0x0) executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x1f) executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) [ 52.653840][ T4254] Bluetooth: hci2: command tx timeout [ 52.661489][ T4636] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000003900)='./file0\x00', 0x440, 0x0) dup3(r0, r1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$notify(r0, 0x0, 0x0) [ 52.756656][ T4636] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.774857][ T4606] netdevsim netdevsim1 netdevsim0: renamed from eth0 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5452, &(0x7f0000002b00)) executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000280)={0x1, 0x0, 0x1000, 0x0, 0x0, 0xffffffffffffff3a, 0x0, 0x0}) executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x5451, 0x0) [ 52.910369][ T4606] netdevsim netdevsim1 netdevsim1: renamed from eth1 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x21, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x78) [ 52.960787][ T4606] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 52.994576][ T4636] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) [ 53.066619][ T4636] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.073257][ T4606] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 53.112199][ T437] device hsr_slave_0 left promiscuous mode [ 53.134130][ T4254] Bluetooth: hci4: command tx timeout [ 53.163966][ T437] device hsr_slave_1 left promiscuous mode executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$addseals(r0, 0x2, 0x0) [ 53.243976][ T437] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 53.246242][ T437] batman_adv: batadv0: Removing interface: batadv_slave_0 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 53.272302][ T437] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 53.275412][ T437] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 53.280165][ T437] device bridge_slave_1 left promiscuous mode [ 53.282570][ T437] bridge0: port 2(bridge_slave_1) entered disabled state executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) [ 53.335162][ T437] device bridge_slave_0 left promiscuous mode [ 53.337249][ T437] bridge0: port 1(bridge_slave_0) entered disabled state executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_SETFSLABEL(r1, 0x5450, 0x0) executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = accept$packet(r0, 0x0, 0x0) signalfd4(r2, &(0x7f0000000080), 0x8, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup3(r3, r1, 0x0) connect$unix(r4, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000002b80), 0x0, 0x0, 0x0) executing program 3: readlinkat(0xffffffffffffffff, &(0x7f0000020140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000031140)=""/4107, 0x100b) executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=0xffffffffffffffff, 0x12) [ 53.466012][ T437] device veth1_macvtap left promiscuous mode [ 53.468380][ T437] device veth0_macvtap left promiscuous mode [ 53.470698][ T437] device veth1_vlan left promiscuous mode [ 53.472383][ T437] device veth0_vlan left promiscuous mode executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x5450, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x5450, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) executing program 3: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) memfd_create(&(0x7f00000002c0)='\xf2\xff\xff\xffF%v\xd5\xb2\xe0PU\x15A\xe0\xa3\x82\xcb\xce\x0fY\x03A\xb4\xb5\t\xa3\xb5m\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xf2\xd8f\xbe/\xcdn\xe6\x01\xa7\xfb\x16\xaa\x84\x01\x80\x00\x00@\x00\x00\x00\xb7w\xd9\xc4`\x15\xf3\x90\x8eqx\x1b\xd6>\x1c\xb1\xde\xf7\xebY;7Jt\x11\x19`^r\x04\xb4\x00ecAZ\xd6\xae\x83rM\x01kNj:lOu\xd7\xf5)\xd4\x95\x97\xdf\x9f\xf1xL[\x17\x0e\xa9W\x9a\x83g\xf3\x199\x93(\x93\xd5\xd1\v\b\xab\xa1\x9dx\x87\b\x87\x0f\xbfA\xd2\xdd\xca\vc\xc16\xe5\xe6\xb6\xd1\x1c\x83i\x9a\x84]\xdf\xa3\xc5\x87\x9d?.\xa6\x04DJ\xf1\x0f\xc3\x1d$\xd0\\\x17E%N\xdd\x00Q\x946&\xf2H\xbb>\xb5hJc\xf9=\au\xe0\x7f\xc2\xfe\x1bb\x00\x00\x00\x00\x00\xa2uT\xc5\x1c\xf5\x1e\xdd\xb4\xae\xa6\xa5js\xff\x82\xcd/4\xc2\x83v\xc3\xbf\x05\x172\x02\x01\xb7\x93\xa0\x95)_&\x87\xf1-p\x9b\x98A\xa8g\xe3\x841\xd4\xe6n\xab\xea\x00'/287, 0x0) ioctl$TIOCGISO7816(r0, 0x5452, &(0x7f0000000280)) executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5411, 0x0) executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101545, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1101030, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x8901, &(0x7f0000000040)) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x105041, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) executing program 3: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x8, 0x0) [ 53.871317][ T437] team0 (unregistering): Port device team_slave_1 removed executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0) mount$9p_virtio(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', &(0x7f00000001c0), 0x110000, 0x0) [ 53.896903][ T437] team0 (unregistering): Port device team_slave_0 removed [ 53.906313][ T437] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) r1 = openat$cgroup(r0, &(0x7f0000001180)='syz0\x00', 0x200002, 0x0) dup3(r0, r1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x5452, &(0x7f0000000080)) [ 53.950241][ T437] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 54.089648][ T437] bond0 (unregistering): Released all slaves executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000400)) executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x10) [ 54.263904][ T4260] Bluetooth: hci5: command tx timeout [ 54.292324][ T4606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.314521][ T4606] 8021q: adding VLAN 0 to HW filter on device team0 executing program 4: socket$inet_udp(0x10, 0xa, 0x0) [ 54.331972][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.334793][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.337302][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.340559][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.343213][ T4287] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.345209][ T4287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.349685][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.352817][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.355586][ T4287] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.357536][ T4287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.359879][ T4287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, 0x0, 0x0) [ 54.378655][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.381364][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.384637][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.395470][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.403377][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.408989][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.413091][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.422242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.425378][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x5421, &(0x7f0000000040)) [ 54.428629][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.431533][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.436954][ T4606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program 0: pipe2(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5451, 0x0) [ 54.494579][ T4636] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 54.539361][ T4636] netdevsim netdevsim2 netdevsim1: renamed from eth1 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5421, &(0x7f0000000100)={'team_slave_1\x00'}) [ 54.555747][ T4636] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 54.596368][ T4636] netdevsim netdevsim2 netdevsim3: renamed from eth3 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) [ 54.645581][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.648364][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.652738][ T4606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.688702][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$KDDISABIO(r1, 0x5451) [ 54.691659][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.725011][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 54.729072][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.732258][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.734725][ T4254] Bluetooth: hci2: command tx timeout [ 54.741294][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.746725][ T4606] device veth0_vlan entered promiscuous mode [ 54.752998][ T4606] device veth1_vlan entered promiscuous mode [ 54.761876][ T4636] 8021q: adding VLAN 0 to HW filter on device bond0 executing program 0: r0 = socket(0x1, 0x80005, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0x5451, 0x0) executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_getscheduler(r1) [ 54.790289][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 54.792932][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 54.795674][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.798392][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.802886][ T4636] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.823193][ T4606] device veth0_macvtap entered promiscuous mode [ 54.829180][ T4606] device veth1_macvtap entered promiscuous mode [ 54.848367][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.851058][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.860697][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.863301][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.866539][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5452, &(0x7f0000001300)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @name="06b9f92aa184e3bbfc81ec4ce1d3ec521f4499e33fbcc4cdc8641444fe0510c7a0b66880ad8e66b629ac369f81d4cd2ae6e9d3ed2b34e6ef8c04186bcff22ec8495a36cf87babf958dff421aef05f6faf74e778afca32e052c3ace16fcc61f3a6c9a9897e20f83e94586ca65dc289a8db8a884ca46a61478b84c6ad157a270a736762939df9d8f2519793347d6039d6afe13fea1769246ebcd7846bc3d41b523fb74ef0bc4a7a94a7af7936a10a267c5be0b876099a38819364da9819dc30de8fffc944b5a9c9373eb11c95f17e88483d464f9a7983af16f8d50da76a20bcf6260e3574d861d3ee1b5b0092cf43738e1aa10be6b1a537c746842097a8af4bf436b3f3840811a936ef98977a8dd98d9a2ba9490101fd9b7ae4e8478ec91dc92ae163bbf7224a32f6105d84847bf42271da226fec510f5f73920e725a1b7c358c8d8daa61b96b8b240e2d737b0a8d5a380cbadc39174e9a68b2eb435d957710fd9a2507befae32fd9a353f37b788d508fa4599be611b65cc69ddd315f69ff39d98868f5626216d6ba8f518b565a6ad51c5b62e9d07e94fa9ce902d8a0b5df6d7ecaaa7a010ee4d184959945fb6795810b3aca872583d031d36fcc6f90c22b3545753e58fae4a2dee7402078c36e2071856cc08194c72362a5ec8d97a1435477af48f33227a290665f6c495cd59e25977687905957e966b90b1a77d55b743dcd3edd18987dd0bfdc84ccd3122129f30bcc6d5c70e71b25b53d0c7d615af4a4eab15f90ea3f3f9d3b5b08818a628d2a3ce9c5cb8445f98d380297f87eb18d8a23319aea8ffd37cbf86e796122307d82d31287ed70268664546ffc526a1b2d8b991a939c5d7651657a4a30c1a0117ad43c42f1e3b33baac7200c5ff498435bc999ca9b1ad1a6bf0811bf616137297ca6c1e8382597d815a075df7ad0e848457d5769b20edfe25c1a8e536cdd347791054f1cf3a22319db41d53458427ab5c7c98937c4e443f5467c1ed62bdc62cd534bd410d00d8afd6555fa6a7c06cd9e4d953ae4ecdf542f9e9015c44d7fb205118d3b279088dd5980c6ff1326e0b520a9b977d73dc6810592640b50ba93ae7655aaba191f958e921819417ff9a76b2bfd6ad19bcc36912690d46ce3fe291362d97cfd2807af2b63c2eea424201628e4933a1052f80b405cb7cd7b535d989b4e04f1083dd296c141a26f833ee2a9f8daefc97709c68b6178383f9b33f883dce7e4ab25b4b3dc9d5f73ecd05f328850792f440f2db6bddae575edcd4059e47914377e3b63ecfaf732a61e7ba3cdd3cb5295b2335f65e2975143a0c483fcfe4be2d5afb554148e47f720e683413eb03ad9feb202d9320b512e0cfb1b78884bcde33318593d9160ca65bba342bca35d3bdcbc8d256c79d57fed044c0089bc075d180912b19657d6bfd2b4992d0ed7161077e47f0bf5d20a99ec4e625b94ac6cec1cc63ab4b291b4ec14e5d4377b2d2a2460a19ae03f5778907334e7008190726ad95c6ee04e6c5dcb5859f38a597185da56c7412c361b39c6ddf4293e007d7cfbc70a3ab097e3415339c360d895cb22e41f7bc22fe5567b14a1f18ef4501204cb22cdfb95e46647727caded7ca7b169dec18cdf5c8555ae1bdcecaf37e8e0bceaed936c2dc4f93af3d462bde05548d895f69e6aafc64e7cf83efeae7cf504e01448e578c4cb3ce6191db59800b0d66719797e6eba48f07204996cab30b412ded1a5be3af504bcf5370be53cf76b7d209f19bcdcd2e4586307896dcd62a41dea86b8838e656d9211bd958d8a1b8b5a945fa295507c639527b90bed42ec89ec1b9db18d239bff97f524652e1396b3e72722a3e65f728996e5ba3280f4aa63479fe787bc85abc03cd26605d93f517c986e00a86e8753dd2dc08d69e87fc7d7d9339aebe3f278bccef89347a4f34c64e132ada5708201ee5e7456f5adceb1932979a949ba25eb4f8ae50d2cbb42fefdf77d30b88d9f87621af76e03511ad16ac0c4cca84e7a0754247101debb90d3680f19a18e27a3bf25d04997ab91de013dede4169af7a698826d1fbeaaae81dd6f9f0dbb04125c729b569e5e415d50dc0934b34f0e14a4237e259dc188863d0a734c634800f9bd58bbb297eabcf9b28d514ff634c697e830cfef5fa5bd97e9712087d94d1c6ab6dddb402972f136520e1879a67725524ab490e1ed2ee9e260841b4a16f58c63900cddfaf9133160399c1f0fa51a65bc4f8d03ea515b65d5d3a15db0836ca404d1e22595bcbf7a41d9b90d83f57619cb101dabb3dd9331f3057eaeedf9ab7f6affe84ac758d4d1aa0087e8d1cd4f63e03534a3a34a894cc9d549debd4dea4ae49a6532b81b584213cbc49f6062568d276dddf3bfe65fc806db6442f09b2b83f97ab0129deb5ef607e9a150e4fad0bbb8e84ba26723735b0c7a63dc60d1f3925d178bfefd71c1b02992d1ef645a2078ffa840e8e2c90afc3ec9f88d631384dbdd7129791c416abe27ce25eb203750eb6d178241e6a67c4d7ada07c639d5fcc32147be8f3ce78e945c14de86009c2222852f821ab1593738894712e47f931ff5840c93a502f6868b85232496fa1bcca3b76894c9d331f5087e57a5093f9ebec7328f33e576f1eac9333877cf38473be0327a4f743743424cf46d650391d3981b6a4783b2d37cd97074df9f5aba7bab28a2f6ff804ffbcdf2f530b47f1ff46135c352bedb896d7d1a416438916e94c596d0805a92152e11217165386cfd711ab5147b4afbb43d403837cea33d768b870f8662378f1b2132f3f9445e828382a0513dbad69a26be191129ce0d8d561a2badc8385706d40aae8cf32890d96ca512be18871a6bd050cc6c170024c9423fcbd355d4d54dfa1e20264f0b2624f4d1b5788f2c4d529b8e421e1b7c17f5ba5070e469c9ca1baeeb922d2639747d83cb90348f07cad8a91faa8489555057a7ce913499b77ac942c47f1cc89f96610a421cc65110145761bdfeeecafbb8f50f746556af635f23351caf72b2a4590fa8855396a710558fadba34789f0285eeba18f8fa661ed875aff256cbd108fad971a0081eb8afd4fa79532d2e3c915fb4142a5a1d754066992ce4c342ede2c1f914db48da78b2a5f04ed498630b3a72bc52738ad5d53226fec9477f434da66d9127220ae1ff7eacfed7e002ecf4813d205fd2f68096726e79e4a00ae2f6739ccadb306500482d7b1f222c5cc248c7c7f13bb3223a1bf67ada422018c3377b5315646dc3b54e15f763394914281ff06c1b2fd58d6e50cacea4760ee95e888f5888d7ade2cdfbf5b8c79d60abcbc00818e8d7b4349feccfe0ad91b41bd95e81e2c36b2caa6ea5b320970abd82a6daee7ac6985b2d89ddd3620afdddfb69c8c2c1e2cafc37969e5df29c0ab3b10b97812a699bcaa7e8c6292b16e8e4e2cdcfb1f6f571ca1e8cf709c3eb6c267debeef59fe4f54e43bf775d69a82c7e6bab85e19a9f42d2e18cacb935dd9b07adf68b65b1fa3050bb7b54b836ed4391219cc0603e049ffa9ee51d58e4fa6ba2b7f422dd01281cd24aade8eefeecfa95e3082db8f04d14c108b9d3454de7d751ca4c473f050b5f90d73580a2cf903d335dde377124b562467846b566e22f1792684091eab8d9a0eb7d4a27759502947c4d1d7c6e82efadc036bb292764e5629f20131c961cae92f35bbb0652fc9cd23bed9ee450d1858dea625d26f72bc0fe6e1022e9735b24f336f000438b012ab53ad3d1b201137f984dd3bca62b25fd894fec16e5d0c88c334bd0a15058799177ace0e7351c0ebe253c0f36f090f1c42683796c2310099ec4030ea83471d316bfeb33467b8566aa271204a4df8ba4cb662b5d26973ed6aa03a82990f00bdc6afa4a8a509ad4655a8f93f7628bba47d4978819c09f464ef82d88e4f503f5ce84fcc26e98fd1db682c824e1034dbdd9684027c42f997d6d04677eee8e0a49ee7adcaa94b83f193819d6987b4fe836931e64c5a65908aa3d8738fd2c5d78dc65bb7686e5a5f70f8bdffbabcd6cb8d4747cf2a759419ea98ed2c29440cd3d87a149956d722686b950e7eef7f393d871721ec92efe2656bc521d48b0248e43a1c17df10721579e4c98bf92b6ec4e164afe4a73c962e3c21e1c434515bc348764cfabfc62ae64a64e69902a2609cc97192006f22368a0ef5df4d67269dbec06e13e9378326cc7fe15d374cb6e71b46b6508ddc432921e34f65bff05549be2883196a299519525f96911a1964b3eb7fee297e72ebb4621e1c53e0125278cbd9ba6c120b97a45d972964bc0c23c15ec0ed7d13abb7abe5d9e9cf2bbd11bd45860a76605d6bbc34a01340cbfd7590b9b37301779827a91102de113787a9213d0081f23e6af865266c946bedd71c7e249a66dd6c16e2e8b08830827a8a24649b65ba7c16f02e5af76fa8ee693a3db5e24027b7f88ab6fb9c9558bc4b088b62d84469801af52170d35a78b71c463c0f6d9f535d0d9105957c332471639ab000113b3ab5d92c6b0d6df42450dca138bd0e56bfc5a323b2c75bb0ab2fcfc8385d1102f93a5f232efb24d01c0e382b0e4b6f2d322a23cf19855563b493ad6abcb6ec53f7c9fbe189804442f4865e43cd901320dbe2f1fe275788b06c1e554ed66fc9f0068841f840f928b3de083633d246e8d4e8d7ae7b422e678f98c350fc3c0e45a6dd1ee8115feb129e2f53729cde5c0a3e40562cc3133e26a78d7de1057f0f9fb9713ab11c41cdb3bf4934b930c62049f8a4ff3cb6eb956f1bd183eec5666ccf63f74f2c393dcb77816499affcd9359876435100196d70538f467835e128259686df0f64c234017e8d29da5ab48f40615cae9a67674f87005dfe502aab1801e7fa65af1476ff60f4ec2ce2711d5787cb9e83818503a10027588d127c05e54491e7d1d45ffafbd430c745b9adbf48729b98191b26f213106190953de2c42e5730aa494a0934422eff392d408cd9d980985002dc703877b8bc6624b9bbb09f91d88a6dd5a1b8280ea1ed960521f7af73393b8306f8632ecb081e932b6f5cd0900656e8d20e32a20eae48edcf0f07e35755fcf66bfa2b3a80ce6203ee44c7e59d848d58aa80c2dd659ebc39a79646b96b8e8ee3efac9cd1a3ebd01329470ca991f90464b70ad35b482c99808d8f1287c42cbce10afae3e423a461518f56c0ba1fbba2eca4af6cd5a11166d01176ab71e2d90a8857a78c6c45035c9e606104d6cc40e34eec0560cd76f395c8eb2847293d9b4dd7d2c5f75eafe8256ea66d9682f2ed861a9a72b35e9970cf47f74cb9bbc885b89fc95e16f5976a888491c1382221b6041933114862e66ad947b1841ed49bf6840757db0fc9be6124ab91db3dd9eabcd306dc08dc46e4ade0b6005af36eaee8975011f9548084be4c1c66ce5954c0753276e32a265f539c242ccc577da840be38810ba128b7f77263dc9a3acbbdd0ab4dc5f24c84ac7fc2c3e862321257f9be5f6f4aa9a71965150ada8ef56cb5835c951724e7ed95f956cad8495d19529166e2db13324d02c3d7c45cd089cb20cc6a09dac91b59cff7c1d3b5c32b341cc55dfbf91867c3aafc489ee3b217f6ba109c4a453973e85920054d91579028241fc5e4e28aa2f0f53d92c418b6b18eb3f8a0939c040b03c2d6304cbe1da247cb1a6830d71bb3df24b229b6487cd875df524f64c8048c921773249362de465178837d649f819b60cf6344692a715d9d"}) [ 54.868904][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.870878][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.905702][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.908369][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.911013][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.914384][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.917747][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.919748][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.922149][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.925521][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCGETA(r0, 0x5421, &(0x7f00000000c0)) [ 54.932392][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.937668][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, 0x0, 0x0) executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x103442, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x2b) [ 55.005213][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.007996][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.010620][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.013471][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.034076][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.037196][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.040522][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept$unix(r0, 0x0, 0x0) ioctl$FIONCLEX(r2, 0x5450) [ 55.043358][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.056247][ T4606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 55.068011][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.070656][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 55.073358][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.084179][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.087677][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.090399][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.093029][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.108506][ T4636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.111803][ T4636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) [ 55.125896][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 3: pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) write$P9_RATTACH(r0, 0x0, 0x0) [ 55.128925][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.131643][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.136435][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.139126][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.141897][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.153661][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 55.156423][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.165361][ T4606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 55.167504][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.170165][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.172765][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 55.187556][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 55.195884][ T4606] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.198262][ T4606] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.200520][ T4606] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 55.202895][ T4606] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') ioctl$TIOCGSID(r0, 0x5451, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5450, 0x0) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000080)={'dummy0\x00'}) [ 55.354632][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 55.356871][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 4: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) [ 55.371358][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x5451, 0x0) [ 55.420040][ T39] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 55.422343][ T39] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 55.425867][ T4253] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c9a987c7a20cb70b2f0f107724b42cdf6d7637e4f3e9bc270d5fe223b3076f4e6f812169b3ff8e49a1297b1d45652c6971528975c23c44112788813162848b2c5982be2dfc321483cc1c746c2a37187557d8be2d678e8e62e6894affb53987a643a364966c028b27680fc95eb80eb24268a738c59345041cd2919e5c6cff4f0a4c34a4337fae24c3bed19f228f5b4d568b4df0e343b0c2fa8708fdf163852513de3b23e6ecaa027cc9d5b02157cae5fde3db5c42187290bc70c19756fdc643358651bda1c362c553346125ec95daec0", 0xd0}, {&(0x7f0000000100)="78205a97a28b9802069a04dd77fd644d984ec8a0aeb9ec79758574d2718f9838f46df8b4e4b6fc8b0e2025d941253312a5d439e8597cd5bd171e85aace0ce70b02cb74f0452f74c572e3070661673f5eb5b5dc6b2fdc2e71f9306575679987ae79d0ab027a0b2d09264c083a2afcf8ec5f554188435367b39be1763bcedb3cdb0d13aa73bb5be7c46c697dce4db25f75f5dedd15775faa2ff5bdd280c1cca7", 0x9f}], 0x2, &(0x7f0000000200)=[@hopopts={{0x30, 0x29, 0x36, {0x0, 0x2, '\x00', [@ra, @jumbo, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim]}}}, @rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@dev]}}}], 0xffffffffffffff99}, 0x0) executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8901, &(0x7f0000000040)) executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x5452, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x5452, &(0x7f0000000040)={@empty}) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x8906, 0x0) executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) sendmsg$inet6(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4080) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x5450, 0x0) [ 55.635739][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.638061][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.666905][ T4636] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_DEFRAG(r0, 0x5450, 0x0) executing program 3: r0 = eventfd2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8904, &(0x7f0000000000)={@private2}) executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x6, 0xd, &(0x7f00000038c0)={{{@in6=@local, @in=@private}}, {{@in6=@private0}, 0x0, @in=@empty}}, 0xe8) [ 55.704971][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 55.707813][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) ioctl$KDFONTOP_SET(r0, 0x5450, 0x0) [ 55.743919][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 55.746764][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.753043][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.765423][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.770932][ T4636] device veth0_vlan entered promiscuous mode executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 55.811249][ T4636] device veth1_vlan entered promiscuous mode executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) sendto(r0, &(0x7f00000000c0)="f5290945", 0x4, 0x0, &(0x7f0000000180)=@l2tp={0x2, 0x0, @loopback}, 0x80) executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) listen(r2, 0x0) ioctl$TIOCGSERIAL(r2, 0x541b, 0x0) [ 55.895257][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 55.897849][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 55.900456][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 55.903182][ T4241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.921485][ T4636] device veth0_macvtap entered promiscuous mode executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 55.936114][ T4636] device veth1_macvtap entered promiscuous mode executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) getpeername$unix(r0, 0x0, &(0x7f0000000000)) [ 55.964802][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.967746][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 55.982888][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 55.991267][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000001c0), 0x0, 0xc000) [ 56.000917][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.021989][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.034128][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 56.037202][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.042435][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) write$yama_ptrace_scope(r1, 0x0, 0x0) [ 56.055459][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x5452, &(0x7f0000000000)={'wlan1\x00'}) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x21) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) [ 56.095364][ T4636] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.104163][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 56.106751][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.109524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 56.112259][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r3, 0x541b, 0x20000000) [ 56.123237][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.131994][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.153938][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.156872][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.159492][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.162322][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2101, &(0x7f0000005980)={0x0, 0x3938700}) executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x5452, &(0x7f0000000040)) executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x5450, 0x0) [ 56.204312][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.207269][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 56.209901][ T4636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 56.212861][ T4636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20842, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) [ 56.267180][ T4636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.275386][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 56.278156][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.304808][ T4636] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.307253][ T4636] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.309674][ T4636] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5421, &(0x7f0000000040)={0x0, 'ip_vti0\x00'}) [ 56.311974][ T4636] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x5450, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0xfffffffffffffd44) [ 56.334893][ T4260] Bluetooth: hci5: command tx timeout executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) read$char_usb(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 56.446040][ T218] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.448274][ T218] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.451508][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x5451, 0x0) executing program 3: listxattr(&(0x7f0000005400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$PAGEMAP_SCAN(r1, 0x5450, 0x0) [ 56.529051][ T4299] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 56.531310][ T4299] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 56.538093][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002600)='/sys/class/dmi', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002b00)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) r3 = dup3(r2, r1, 0x0) write$P9_RCLUNK(r3, 0x0, 0x0) executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5451, 0x0) executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDMKTONE(r0, 0x5451, 0x0) executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x5450, 0x0) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5452, &(0x7f00000000c0)={0x0, 'veth1_to_batadv\x00'}) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0xffffffffffffff6b) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x541b, &(0x7f0000000080)={'vcan0\x00'}) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$PIO_FONTRESET(r1, 0x5452, 0x20000000) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) getpeername$inet(r1, 0x0, 0x0) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$TCXONC(r0, 0x5450, 0x1) executing program 1: r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0x5450, 0x0) r2 = accept4$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x0, 0x100000) r3 = add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)=ANY=[@ANYBLOB="c8e1349d060000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c"], 0x48, 0xfffffffffffffffe) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000280)={@id={0x2, 0x0, @b}, 0x2, r3, '\x00', @auto=[0x20, 0x2f]}) epoll_pwait2(r0, &(0x7f0000000080)=[{}], 0x1, &(0x7f0000000540)={0x0, 0x3938700}, 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0) pipe2(&(0x7f0000000040), 0x0) mlockall(0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2fc2, 0x0) r5 = socket$inet6(0xa, 0x80801, 0x0) ioctl$GIO_UNISCRNMAP(r5, 0x5450, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000000)) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) [ 56.817654][ T4254] Bluetooth: hci2: command tx timeout executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept$unix(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{}, {0x0, 0x989680}}, 0x0) executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x5450, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x5451, 0x0) executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5452, &(0x7f0000000040)) executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x286000, 0x110) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000280), &(0x7f00000002c0)=0x4) executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.pending_reads\x00', 0x4cd40, 0x0) ioctl$NS_GET_USERNS(r0, 0x5450, 0x0) executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x20142, 0x0) mount(&(0x7f0000000040)=@filename='./file1\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x909000, 0x0) mount$tmpfs(0x0, &(0x7f00000012c0)='./file1\x00', 0x0, 0x300011, &(0x7f0000001340)) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8970, &(0x7f0000000640)={0x2, 'veth0_to_bridge\x00'}) executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/virtual', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x5450, 0x0) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VT_GETSTATE(r1, 0x541b, &(0x7f0000000000)) executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r3, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x11, 0xd, 0x0, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_netdev_private(r0, 0x8903, &(0x7f00000000c0)) executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x8946, &(0x7f0000001400)) executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x5451, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x5451, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x5411, &(0x7f0000000240)) executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000001180), 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x23c0, 0x85) executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$TIOCCBRK(r0, 0x541b) executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20242, 0x0) read$watch_queue(r0, &(0x7f0000000300), 0x0) executing program 4: tee(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0, 0x2) executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0x5450, 0x0) executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=0xffffffffffffffff) executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r0) memfd_create(&(0x7f0000000000)='^[\x15*\x00', 0x0) fdatasync(r0) executing program 4: r0 = memfd_create(&(0x7f0000000780)='\x00', 0x0) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f0000000040)) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$VT_OPENQRY(r1, 0x5451, 0x0) executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x5451, 0x0) executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) write$P9_RLOPEN(r0, 0x0, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x5451, 0x0) executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780), 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, 0x3938700}}, 0x0) tkill(r1, 0x1000000000016) executing program 2: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x8902, &(0x7f0000000240)) executing program 1: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x5450, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x5451, 0x0) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x5450, 0x0) [ 58.424737][ T4260] Bluetooth: hci5: command tx timeout executing program 1: pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r1, r0, 0x0) shutdown(r0, 0x1) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) dup3(r0, r1, 0x0) write$cgroup_int(r1, 0x0, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5451, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5450, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDSETLED(r0, 0x8901, 0x20000000) executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fstat(r0, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r1) syz_mount_image$erofs(&(0x7f00000000c0), &(0x7f0000000000)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x5450, 0x0) executing program 1: ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000003"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ftruncate(r1, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x5451, 0x0) executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) write(r1, 0x0, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getuid() fchown(r0, r1, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$KDFONTOP_GET(r0, 0x5452, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 0: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8903, &(0x7f0000000080)={0x7, 'virt_wifi0\x00'}) [ 58.893825][ T4254] Bluetooth: hci2: command tx timeout executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000140)=0xac) ioctl$NS_GET_NSTYPE(r1, 0x5450, 0x719000) executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r0) memfd_create(&(0x7f0000000140)='-B\xd5N\xa6\x90\xe4\xb5q\xe3\x9a\xf4\xf1k\x0f5\xbb\x14\xe3wT\xcb\v\xfb\xc7\x84\xa2m\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x84\x84\x00\x00\x00\x00\x00\x00knZ#\xcf)/\xc8\xd0:\x9cc\x10d\xee\xad\x8bcc\xad\x89\x9ci\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcd\x97\xb4\v\xa9=\xcdJxP5\xa9\xb2\x04K\x98\x934\xd6\xfe7\x0f\x00\x01\x00\x00\x00\xd4\x9d\x04\x1fb\x99\x9b\xd0A\xb8\xa9\xc7\\\xea\xd9\xe3K\xc1Vw\xd6\x05\x00\x00\x00H- \f\xea\xb2\x9d\xf4\x9e\xf7$>\xd2\xb3\xb7\x1d\xac&T4\xd6*u\xaa\x80\x97\xbbAF%\xd9T\v\xa0\xb7+O\xa2\xef\xe3N7\xfe\xaf@\xfe\xfb\xdfl\xb76\xed\xa4.\x0f\x92?\x84\xbd\x95\xc5\x9d\xce\x17\xf7-\x1f\xafH\xeb\xd1Zu\xd3l\xbd\xc7\xa39\x95\b,RM\xe9v\xf73s\xd2\xa4{\xb1\x9c \x05\x1f3)S\x99\xbaq\xbelBBo\xfd\xd1\xcb\xd5p`\xa4\xe1\xc2\xe8u\xc0x\x95\xa3`,\xa4\xb19]\xee\x9d\xb4R\xe9\'2\xe2\x83\x87X\xe2\xb6\xb2\x12xUnh\xa5\xe5G5r\x85s\xc4\xbe\xb8a-\x04\xe5*\x9e\x02+\xd8\x8dv*\x8a\x93w\x02\xed\xf6\x8av\xf3<38T\x97cO\r>\x00\xb8DX\x04e\x0fD\xbb\xe1\xa9\x00\xde\xe4jx\xac\x17\xeb\xcb/\xef0L\xf91\xfd\x82\x1e\xa5\t\x9a\xf0\x91uQ\xddq:2\xdd\a\xd2\xc9d}\xfe\x13\xbc\n\xbb\x12Q', 0x0) fcntl$F_GET_RW_HINT(r0, 0x8, 0x0) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x20000000) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x0) executing program 2: lsetxattr$system_posix_acl(&(0x7f0000003b40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000003d80)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x5452, &(0x7f0000000040)) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$FITHAW(r3, 0x5450) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000740)=@buf) executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)) executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x9]}, 0x8, 0x80000) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={'L+', 0x7fff}, 0x16, 0x1) read$eventfd(r0, &(0x7f00000001c0), 0x8) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) mq_open(&(0x7f0000000380)='[+-]$\'\x00', 0x80, 0x60, &(0x7f00000003c0)={0x3, 0xfffffffffffffffd, 0x8000, 0xffffffffffffff52}) executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x43, 0x0, &(0x7f0000000540)) [ 59.419275][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 2: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040)=0x6, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) r2 = dup(r1) write$P9_RUNLINKAT(r2, 0x0, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$unix(r2, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x5451, 0x0) executing program 0: r0 = mq_open(&(0x7f00000000c0)='.\'h\'\\E\x00', 0x40, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x5452, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x5450, 0x0) executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$KDGETMODE(r1, 0x5451, 0x0) executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000007c0), 0x8, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x5451, 0x0) executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x5451, 0x0) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmsg$inet6(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) dup3(r1, r0, 0x0) readv(r0, 0x0, 0x0) executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/dmi', 0x0, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) write$9p(r0, 0x0, 0x0) executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5450, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x8910, &(0x7f0000000000)) executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0xfffffffffffffc9a) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @empty}, 0x10) getsockopt$EBT_SO_GET_INFO(r2, 0x6, 0xb, 0x0, &(0x7f0000000440)) executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5450, 0x0) executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80541, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) readv(r1, 0x0, 0x0) executing program 4: r0 = memfd_create(&(0x7f0000000600)='team0\x00', 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) [ 59.920852][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) dup3(r1, r0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000400)=""/142, &(0x7f00000004c0)=0x8e) executing program 2: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) executing program 4: prctl$PR_GET_UNALIGN(0x59616d61, 0x0) executing program 2: socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003700)='./file0\x00', &(0x7f0000003740), 0x0) socketpair(0x1, 0x0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/power_supply', 0x0, 0x0) mq_open(&(0x7f0000000000)='\x91@\xcf\xe4q\xc3\x01\x01', 0x841, 0x70, 0x0) executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0xa041, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5450, 0x0) executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80040, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x60000, 0x8) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TFD_IOC_SET_TICKS(r2, 0x5411, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000040), 0x2, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000240), 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) executing program 4: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x801, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000400)={0x14}, 0x14) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') ioctl$TUNSETGROUP(r0, 0x5451, 0x0) [ 60.346238][ T39] device hsr_slave_0 left promiscuous mode executing program 4: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5451, 0x0) executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000010c0)='/sys/class/power_supply', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5452, &(0x7f0000000100)={0x0, 'pimreg1\x00'}) [ 60.394683][ T39] device hsr_slave_1 left promiscuous mode executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x5451, 0x0) executing program 4: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) ioctl$TIOCGWINSZ(r0, 0x5450, 0x0) [ 60.473809][ T39] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 60.475836][ T39] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 60.482974][ T39] batman_adv: batadv0: Interface deactivated: batadv_slave_1 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x50, 0x0, &(0x7f0000000080)=0x700) [ 60.490997][ T39] batman_adv: batadv0: Removing interface: batadv_slave_1 executing program 2: pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$FS_IOC_MEASURE_VERITY(r0, 0x5451, 0x0) [ 60.505645][ T39] device bridge_slave_1 left promiscuous mode [ 60.514906][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.548209][ T39] device bridge_slave_0 left promiscuous mode [ 60.550175][ T39] bridge0: port 1(bridge_slave_0) entered disabled state executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) write$P9_RSYMLINK(r1, 0x0, 0x0) executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$tcp_congestion(r1, &(0x7f0000000100)='yeah\x00', 0x5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) dup3(r3, r1, 0x0) executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2, &(0x7f00000000c0)={@dev, @initdev, @multicast1}, &(0x7f0000000100)=0xc) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8903, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}}) [ 60.703938][ T39] device veth1_macvtap left promiscuous mode [ 60.705801][ T39] device veth0_macvtap left promiscuous mode [ 60.707467][ T39] device veth1_vlan left promiscuous mode [ 60.709049][ T39] device veth0_vlan left promiscuous mode executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000280)='.pending_reads\x00', 0x40040, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000013c0)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x8902, &(0x7f00000000c0)) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_RM_DEV(r0, 0x8906, 0x0) executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5403, &(0x7f0000000080)) executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x34, &(0x7f0000000000), 0x0) executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0xffffffffffffffff, 0x0) executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) close(r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r3 = ioctl$TUNGETDEVNETNS(r2, 0x5421, 0x20000000) fchmod(r3, 0x0) executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.log\x00', 0x80442, 0x0) ioctl$KDSETMODE(r0, 0x5451, 0x0) executing program 4: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RWALK(r0, 0x0, 0x3d) close(r0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) socket$unix(0x1, 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, 0x3938700}}, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0xfdb6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b44cf578f00", '\x00', "066580001e00"}, 0x38) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b40), 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5450) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x541b, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) executing program 4: r0 = socket(0x1, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8912, &(0x7f0000000500)={'sit0\x00', 0x0}) executing program 3: ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000003"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) fchmod(r1, 0x0) executing program 1: r0 = memfd_create(&(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', 0x0) close_range(r0, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 61.408265][ T39] team0 (unregistering): Port device team_slave_1 removed executing program 1: pipe2(&(0x7f0000002240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) [ 61.436937][ T39] team0 (unregistering): Port device team_slave_0 removed [ 61.452863][ T39] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x5450, 0x0) [ 61.511233][ T39] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 61.692919][ T39] bond0 (unregistering): Released all slaves executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto(r1, 0x0, 0x0, 0x20000800, 0x0, 0xfffffffffffffeb7) executing program 4: pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f0000000280)=0x10) executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000005) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$packet_drop_memb(r0, 0x29, 0x3, 0x0, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8906, 0x0) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) write$cgroup_pid(r1, 0x0, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0xfdb6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b44cf578f00", '\x00', "066580001e00"}, 0x38) executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5452, &(0x7f0000000000)={0x1, 'pim6reg\x00'}) executing program 0: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5451, 0x0) executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8904, &(0x7f0000000040)={'syztnl0\x00', 0x0}) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000), 0x0) executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x14, &(0x7f00000001c0)=""/127, &(0x7f0000000240)=0x7f) executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') ioctl$KDGETLED(r0, 0x5451, 0x0) executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1010c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x5450, 0x0) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept$unix(r0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x9, 0x0) executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) close(r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) write$cgroup_subtree(r4, 0x0, 0x0) write$FUSE_DIRENT(r1, 0x0, 0x0) dup3(r3, r1, 0x0) executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$char_usb(r0, 0x0, 0x0) executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) write$P9_RXATTRWALK(r0, 0x0, 0x0) executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$inet(r0, 0x0, &(0x7f00000000c0)) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0xfdb6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b44cf578f00", '\x00', "066580001e00"}, 0x38) executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000002740), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000046c0)={'veth1_to_bridge\x00'}) executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000003940)='./file0\x00', 0x840, 0x3a) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000780)='/sys/class/power_supply', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5450, 0x0) executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002240), 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x5450, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) ioctl$VT_GETMODE(r0, 0x5450, 0x0) executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) close(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) socket(0x2, 0x80802, 0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0xb, &(0x7f0000000040), &(0x7f0000000000)=0xc) executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r1) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, 0x0, 0x0) executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5450, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmmsg(r0, &(0x7f0000005e40)=[{{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f00000025c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000100)) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) executing program 1: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$TIOCSIG(r0, 0x5450, 0x0) executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @initdev}}) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) write$cgroup_subtree(r0, 0x0, 0x0) executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x5451, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0xfdb6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b44cf578f00", '\x00', "066580001e00"}, 0x38) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)) executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0xfffffd0e) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x45) listen(r2, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_GETXATTR(r3, 0x0, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x1c, 0x0, 0xffffff8e) r4 = accept$inet6(r2, 0x0, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r2, 0x0, 0x0, 0x800) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_mreq(r4, 0x29, 0x3f, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x8912, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r3, 0x5452, &(0x7f0000000000)={0x1, 'veth1_to_bond\x00'}) executing program 1: setresuid(0x0, 0xee01, 0xee01) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x400454ca, 0x0) executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x69032, r0, 0x0) executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0x6, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000780)="fbbf0b5044e308cb7bd572aa2b42e9678bcf30eff9f3aed14dc94a114bd2b45956aebe2b108a87e865501a5f9e0383611afdd3f8bac3d5cfd7772a3ab48d0ba4b600731e357e38716c449fae7c28548a4f2105f44b8fd9b33041270ae01f1a405e3f650fc3b0926d481c364fca00000000000000006d3a3ede9fc738b8d862b9d055aa2d89fe3458720724853a876448d4a1fe9ef0569ad98a05ab5df763923b4e2c576e00000000000000000000000000002000002090666159e3ef5f7244cf4ec3d7814c0c934f44e200219e6dd7bc23397d5f2f2c76a5baddd0fd8c340362691ef226f7a0ac51b74b6be5ed6737948514cd466943d08eeb3895b80499da2b209da4f3ec5e3744ce3e863b0e04d0ec2f39edf50b6e08c4b47e448a35414763d687fbe3792ee15c5b9791310a346472723c100bf77a310b0ced8004b5ac1b3fca19fc0a9e346a78c12e5c3c6d48c40439f512e8ef34a53d65f55563f68136a577736ca5f6f66e01ef4ec2cdc8db34f6de50713adaa3f70189958263fddc1314f8a28ccdef6e1390c5fbaeadc3035d019f0dc75de307de6c0d010000000000000027ec3d1d5b4b013c503b863b560688d94de886b6dc73d5da2dfeff4bed1a49a975a6c8dbb480e4415ddca5657a5a8e3b111015499e952bb5e8d8f60de3d688df7802c6e8b27b31fac4e199038b79a3999920e634a5af16aa9581b0e6647e410700246548234acacf9cb43ab332a37bbc926c39897395c974fda31536be523bf4260300730ae6136fecae5f0fa6ab2df8d98128b24589e314f57d9507dc5e0d65cc397e3f8204d48e59e8e294a6d7008ba8fba28cd5009fe1a7c569ce740078bf1c7389a6ba0f89257f06ac417aac0d2d89b05ee5dafa2f1d936c87264d077b2c0d5abdce943f895dd45045d4ec932366c67dfad087fa8dc104644828440bdf67dd97ebccb3bda8847e37f3c3d49018ecb97ce1a4a6cbd7c3ec5029d938b18a206f7f9bf678dfef1758d6a1ec0000000000000000000000000000003454686fbafb46bef43449725b85cfd3547fa97111e037819af7a0c21b15f4c3e3e4b64e130528d055cfc5fe1fe26307ea8e352cd098d8eac5d0ba0514556a9ca4534518f51bd41f43f21afe183a6233650514ca340a899a28d7784b747af027e7c986b1e66d0ea260b9a4bc4e6da64d984dc79646c6c61c4cd5458a0b8e14f9abc0ddb9cc164a22f6", 0x54e676f5, 0xc000, 0x0, 0xffffffffffffff59) r1 = dup(r0) write$P9_RSTAT(r1, 0x0, 0x0) [ 62.792998][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x80341, 0x0) dup3(r0, r1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, 0x0, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x5421, &(0x7f00000000c0)) executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5451, 0x0) executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$TIOCGPKT(r0, 0x5421, &(0x7f0000000100)) executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x5452, &(0x7f0000000040)) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x5421, 0x20000000) executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f0000000380)='.pending_reads\x00', 0x0, 0x40) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x11, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x5450, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) dup3(0xffffffffffffffff, r0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x1430, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='.\x00', 0x0, 0x0) r2 = dup(r1) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFSUUID(0xffffffffffffffff, 0x5451, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = mq_open(&(0x7f0000000000)='-$\x00', 0x40, 0x40, &(0x7f00000003c0)={0x5, 0x2, 0x7fffffff}) dup3(r3, r4, 0x80000) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_elf32(r5, 0x0, 0x0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f00)=0x14) executing program 3: syz_mount_image$fuse(0x0, &(0x7f000000d280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f000000cf40)='./file0\x00', 0x0, 0x10, &(0x7f000000cf80)) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0x5451, 0x0) executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1ca440, 0x0) read$char_usb(r0, 0x0, 0x0) executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001000), &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000140)='./file0\x00') r1 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100421, &(0x7f00000005c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000540)=""/110, 0x6e) executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f00000012c0)=[{0x0}], 0x1, &(0x7f00000016c0)=[{0x0}], 0x1, 0x0) [ 63.345057][ T5369] tmpfs: Unknown parameter 'fd' executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$TIOCSBRK(r0, 0x5450) executing program 4: pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0xfffffdb6) sendmmsg$unix(r0, &(0x7f000000e380)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)='P', 0x1}], 0x1, 0xffffffffffffffff}}], 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r0, 0xa, 0x12) r1 = getpid() fcntl$setown(r0, 0x8, r1) close(r0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RUNLINKAT(r2, 0x0, 0x0) r3 = gettid() tkill(r3, 0x16) executing program 3: r0 = eventfd2(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') close(r0) read(r1, 0x0, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) close(r3) executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5452, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$KDSKBENT(r0, 0x5452, 0x0) executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) dup(r0) executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/fs/cgroup', 0x8000, 0x14) executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000008040)='/sys/devices/system', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/165, 0xa5) executing program 4: r0 = epoll_create1(0x0) ioctl$FIGETBSZ(r0, 0x5451, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$KDFONTOP_GET(r2, 0x541b, 0x0) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$KDGETMODE(r1, 0x5451, 0x0) executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) close(r0) memfd_create(&(0x7f0000000000)='%):([.f\x00', 0x0) write$cgroup_pid(r0, 0x0, 0x0) executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5452, &(0x7f0000000100)) executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x21, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x78) executing program 3: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RREAD(r0, 0x0, 0x82) close(r0) socket(0x11, 0x2, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000010c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup(r0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x5452, &(0x7f0000000100)) executing program 0: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x5451, 0x0) executing program 4: r0 = socket(0x1, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x9, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000580), 0x0) executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='comm\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RVERSION(r1, 0x0, 0x0) executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000001ec0)={0x2, 0x0, @remote}, 0x10) write$P9_RXATTRCREATE(r0, 0x0, 0x0) executing program 4: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$TIOCGSERIAL(r0, 0x541b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000004c0)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000003ac0)) executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x8903, &(0x7f0000000780)) [ 64.284436][ T5429] binder: 5428:5429 ioctl 8901 20003ac0 returned -22 executing program 0: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x5450, 0x0) executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0xa041, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x5450, 0x0) executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000001, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x5411, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000440)=@abs, 0x6e, 0x0}, 0x0) executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x5450, 0x0) [ 64.495860][ T2050] ieee802154 phy0 wpan0: encryption failed: -22 [ 64.497735][ T2050] ieee802154 phy1 wpan1: encryption failed: -22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) dup3(r1, r0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000), 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0xffa8) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000040)) executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x8802, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000080)={0x7}, 0x7) executing program 3: write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80141, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @empty}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x8001, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}}, 0x0, 0x0, 0x0, 0x0, "2ed09ac81975d66f1a9abb6463b9e6e29407742a59d4f62fc630162c8d17ba79a26f2d7875ec1a9a1ede241624925c986b8dc9549dba019734df65d2b7cefcc1af211f94393d9870c6724af223d0cd68"}, 0xd8) executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0xd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) r0 = memfd_create(&(0x7f0000000480)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\x82E6\x8f\xee\x88e\x7f\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80k\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xc0\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xcekh\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd0/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x80th~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88YY\xd4\xff\x00\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc7\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRYX\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\xded\x16A!\x8b#1\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82J\xca\xdf:\x8ft\xe0\xf8\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\x92\xde\xd5\xe0\xde-U\xd8\xc5\x85\x9d\xb6~p;\xe3\"`\x83\x12\xc1\xa5\xa7\tf\xf2\xde\xe2\x01\xcc\xf7\x1cjq0\x90\xa9g{\x9b6\xc4cN\xcd\xc6\xfbw\x01\xe3Z\x02\xed\xab\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xb, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x800000b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x5450, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, 0x0, 0x0) [ 66.730226][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5452, &(0x7f0000002040)={{}, "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"}) executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_UNISCRNMAP(r1, 0x8946, &(0x7f0000000080)) executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x5451, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f00000025c0)={{r0}, 0x0, 0x2, @unused=[0x2, 0x4a0889c1, 0x81, 0xc2], @devid}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r3, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r4 = accept(r3, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x3b, &(0x7f0000001080)={0x3a, 0x1, '\x00', [@jumbo, @pad1, @enc_lim={0x4, 0x1, 0x2}]}, 0x18) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000012c0)={[0x3c7c]}, 0x8, 0x80000) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000280)) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GETFSUUID(r1, 0x5451, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x541b, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) [ 66.883176][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETVNETBE(r1, 0x5451, 0x0) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup(r0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x5450, 0x0) executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BINDER_WRITE_READ(r0, 0x5450, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) ioctl$KDSKBLED(r3, 0x5450, 0x0) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000f40), 0x8, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x5451, 0x0) executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = mq_open(&(0x7f0000000240)=']{\'\x00', 0x40, 0xe0, &(0x7f0000000280)={0x0, 0x9, 0x10000, 0x9a8e}) dup3(r0, r1, 0x80000) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000002c0), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000880)={0xffffffffffffffff, 0xee01}, 0xc) getsockname$netlink(r1, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5451, 0x0) executing program 0: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) write$P9_RSTATu(r1, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x5421, &(0x7f0000000100)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5452, &(0x7f0000000080)) executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0x5450, 0x0) executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000009d80)='./file0\x00', 0x8c040, 0x4c) executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x5452, &(0x7f0000000040)) executing program 3: pipe2$watch_queue(&(0x7f0000000140), 0xb82e336200000000) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='fd/4\x00') ioctl$BTRFS_IOC_RM_DEV(r0, 0x5452, &(0x7f00000013c0)={{}, "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"}) executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0x8901, &(0x7f0000000180)) executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000400)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r3, r1, 0x0) executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8906, 0x0) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3005008, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file2\x00', 0x0) executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000180)) executing program 3: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000001580), 0x2, 0x0) fcntl$setsig(r0, 0xa, 0x0) executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) executing program 1: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x5411, &(0x7f0000000100)={'sit0\x00', 0x0}) executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = timerfd_create(0x0, 0x0) ioctl$FICLONE(r2, 0x5451, r1) executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='comm\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x5450, 0x0) executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) write$char_usb(r1, 0x0, 0x0) executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$sock_SIOCBRADDBR(r0, 0x5451, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000340)) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f00000000c0)={'veth1_macvtap\x00', {0x2, 0x0, @dev}}) executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x5450, 0x0) executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x5450, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x801, 0x0) dup3(r1, r0, 0x0) connect$packet(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) recvfrom$inet_nvme(r0, 0x0, 0x35, 0x0, 0x0, 0x46) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000009c0)) executing program 4: r0 = mq_open(&(0x7f0000000280)='&:+^#})^^+\x00', 0x40, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) close(r0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001140)={"97b6c0df412b724bcabbdcd7cdf5e251", 0x0, 0x0, {0xfff}, {0x7}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x40) executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$netlink(r0, 0x0, &(0x7f0000000040)) executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000016500)) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="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", 0x10af6109, 0xc000, 0x0, 0xfffffcef) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getpeername$inet6(r0, 0x0, 0x0) executing program 4: r0 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r4, r3, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000004680), 0x8, 0x0) ioctl$VT_RESIZEX(r0, 0x5451, 0x0) executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0x5451, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x5452, &(0x7f0000000080)={0x1, 'veth1\x00'}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES8=r0, @ANYBLOB="00ac47c513a1bb2cc20000000000ffff00"/27]) read$char_usb(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$char_usb(r2, 0x0, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000006c0), 0x2, 0x0) dup3(r0, r1, 0x0) getsockname$inet6(r1, 0x0, &(0x7f0000000740)) executing program 0: semctl$SEM_INFO(0xffffffffffffffff, 0x1, 0x13, &(0x7f0000000000)=""/82) [ 68.552109][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x2, 0x300) close_range(r0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) write$binfmt_script(r0, 0x0, 0x0) executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_mreq(r0, 0x29, 0x7, &(0x7f0000000080)={@ipv4={""/10, ""/2, @initdev}}, &(0x7f00000000c0)=0x14) executing program 0: lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'U-', 0x8}, 0x16, 0x2) msgget$private(0x0, 0x0) timer_create(0x5, 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffa000/0x3000)=nil) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000340)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x200000, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8901, &(0x7f0000000380)) executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) flistxattr(r0, 0x0, 0x0) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x43, 0x0, &(0x7f00000001c0)) executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0x5450, 0x0) executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x5421, &(0x7f0000000000)={'vcan0\x00'}) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @empty}, 0x10) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) [ 68.831232][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 0: r0 = socket(0x11, 0x2, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGPKT(r1, 0x5451, 0x0) executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/dmi', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x5450, 0x0) executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_UNISCRNMAP(r0, 0x541b, &(0x7f00000000c0)) executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000002640), &(0x7f0000002680)=0x4) executing program 2: lsetxattr$security_ima(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), &(0x7f00000000c0)=@sha1={0x1, "03b5c6e30124ac6f6914732b00"}, 0xffffffffffffff23, 0x0) executing program 0: r0 = socket$inet6(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x8906, 0x0) executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000002600)='proc\x00', 0x0, 0x0) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2040002, &(0x7f0000000240)='#@(\x00') executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file2\x00', 0x0) mknodat$null(r1, &(0x7f0000000000)='./file2/file0\x00', 0x0, 0x103) executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) read$char_usb(r0, 0x0, 0x0) executing program 0: socketpair(0x1, 0x80001, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000340), 0xffffff46) r2 = dup3(r1, r0, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000200)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) close(r2) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) socket$unix(0x1, 0x1, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x5452, &(0x7f0000000000)={'wlan0\x00', {0x2, 0x0, @dev}}) executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x1a, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RREAD(r0, &(0x7f0000000200)={0xb}, 0xb) close(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socket$unix(0x1, 0x1, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) executing program 4: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001600)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0x5450, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$GIO_CMAP(r0, 0x541b, &(0x7f0000000080)) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x5451, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) fstatfs(r3, &(0x7f0000000000)=""/226) executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$TIOCSLCKTRMIOS(r0, 0x541b, &(0x7f0000000000)) executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDDELIO(r0, 0x5450, 0x0) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20842, 0x0) ioctl$TUNGETFILTER(r0, 0x5450, 0x0) executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) executing program 0: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5451, 0x0) executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001100)='.log\x00', 0x121a40, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5421, &(0x7f0000000000)={'netpci0\x00', {0x2, 0x0, @local}}) executing program 4: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x5451, 0x0) executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0x5450, 0x0) [ 69.615391][ T14] cfg80211: failed to load regulatory.db executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000240), &(0x7f0000000300)=0x10) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5411, 0x0) executing program 4: r0 = socket(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffe66) executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20842, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x5450, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0x8903, &(0x7f0000000240)) executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$netlink(r0, &(0x7f0000008f80)={0x0, 0x0, 0x0}, 0xc080) executing program 3: socket(0x1, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000140)='\x00\xb40\x87\xcd\xcd#c\t!\".\x89\xb1\xf2(\x96\x00D\xdb4\xaa\x9dk\xac\xb1\xd6vP7]DM*\xb5\x05\xd7\x13\x1e\xe3\\\v\xa7\x14\x00n\'\xcb\xae\xfdR\x12\xb1', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder-control\x00', 0x0, 0x0) executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = dup(r0) r2 = openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x63, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)) executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000003800), 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000003840)) executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r2, 0x5450, 0x0) executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) dup3(r0, r2, 0x0) sendmsg$inet6(r2, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000001400)={0x2, 0x0, @loopback}, 0x10) write$P9_RUNLINKAT(r0, 0x0, 0x0) executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8903, &(0x7f0000000040)) executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x6, 0x1000) executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x5451, 0x0) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_FONTRESET(r2, 0x541b, 0x20000000) executing program 4: r0 = epoll_create1(0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x5452, &(0x7f00000001c0)={'wlan0\x00'}) executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x21, 0x0) write$P9_RCREATE(r1, 0x0, 0x0) executing program 4: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$VT_OPENQRY(r0, 0x540e, 0x0) executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) write$FUSE_DIRENT(r2, &(0x7f0000000740)={0x10}, 0x10) recvmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) dup3(r0, r1, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c, 0x0, 0x0, 0x0, 0xfffffffffffffff7}}], 0x1, 0x0) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @empty}, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000140)=0x1e) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet_buf(r3, 0x0, 0x8, &(0x7f0000000480)=""/237, &(0x7f0000000580)=0xed) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r2, 0x800000005450, 0x0) executing program 0: socket$unix(0x1, 0x5, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000001800), 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "dbe254a6296588aa", "4374925efe8a895fdaad0489f3e268e6", "f7ba5b72", "97ded30111485f5b"}, 0x28) executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x400000000000) executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x33, 0x7, 0x0, {0x2a, '/proc/sys/net/ipv4/tcp_congestion_control\x00'}}, 0x33) close(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4880, &(0x7f0000000080)={0x2, 0xa, @remote}, 0x10) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x8901, &(0x7f0000000000)) executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000c00)={'filter\x00'}, &(0x7f0000000c80)=0x54) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x5451, 0x0) executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) fstatfs(r0, &(0x7f0000000000)=""/105) executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000180)) dup3(r0, r1, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000380)={'ipvlan1\x00'}) executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x5421, &(0x7f0000000140)) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, 0x0, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8906, 0x0) close(r0) executing program 4: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x5451, 0x0) executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/fs/cgroup', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8901, &(0x7f0000000040)) getgid() r2 = mq_open(&(0x7f0000000080)='{\x00', 0x40, 0x0, &(0x7f00000000c0)={0x0, 0xfff, 0x2530}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x79) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001f40)) executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x1, 0x0, &(0x7f00000002c0)) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000080)=0x80) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x5451, 0x0) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000008500)) executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$TCSETSW2(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "5f91e9caf5208640ca42486000"}) executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1525ea9ed857c139) r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) executing program 0: rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) prlimit64(0x0, 0x1, &(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='status\x00') write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x11, 0x12, 0x0, 0x0) executing program 2: prctl$PR_SET_UNALIGN(0x18, 0x0) executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000900)=[{{&(0x7f0000001b80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, 0x0, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0xd, &(0x7f0000001840)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000018c0)=0x78) executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8904, &(0x7f0000000040)) executing program 1: mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0xb, 0x0, &(0x7f0000000040)) [ 71.398291][ T4254] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.401802][ T4254] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.404652][ T4254] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.407673][ T4254] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.410526][ T4254] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.412830][ T4254] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_SEND(r0, 0x5450, 0x0) executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5450, 0x0) executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCSBRK(r0, 0x5411) executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMPNS(r0, 0x5450, 0x0) executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$TUNSETDEBUG(r0, 0x5450, 0x0) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000001100), 0x0) executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x5450, 0x0) executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/netstat\x00') executing program 4: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0x0) executing program 1: r0 = openat$urandom(0xffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x5452, 0x0) executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KDSKBENT(r0, 0x5452, &(0x7f0000000080)) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) write$binfmt_aout(r2, 0x0, 0x0) [ 71.879126][ T218] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x5450, 0x0) executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$FUSE_INIT(r0, 0x0, 0x0) executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000005) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x880, 0x0) [ 71.966218][ T218] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.985136][ T5767] chnl_net:caif_netlink_parms(): no params data found executing program 4: r0 = socket(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, 0x0, 0x0) executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x10, 0x0) executing program 4: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000180)=0x2, 0x4) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000040)={@local, @remote}, 0x8) executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_out(r0, 0x800000005452, &(0x7f0000000180)) [ 72.070727][ T218] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/class/dmi', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5451, 0x0) [ 72.126194][ T218] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0x0) write$tun(r0, 0x0, 0x0) executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r0, 0x3, 0x0) [ 72.201753][ T5767] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.222674][ T5767] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.236786][ T5767] device bridge_slave_0 entered promiscuous mode [ 72.244610][ T5767] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.250091][ T5767] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.259793][ T5767] device bridge_slave_1 entered promiscuous mode executing program 4: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002880), 0x2, 0x0) dup3(r0, r1, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) executing program 1: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x5450, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x1f, @empty}, 0x1c) listen(r2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000040)) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) listen(r3, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x541b, 0x0) r4 = accept(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000140)=0x807f0cac1cbb7983, 0x4) [ 72.325766][ T5767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.330105][ T5767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCGLCKTRMIOS(r0, 0x5452, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "08000400"}) [ 72.348386][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x6001, 0x0) write$binfmt_aout(r0, 0x0, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$EXT4_IOC_SETFSUUID(r2, 0x5451, 0x0) executing program 1: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) memfd_create(&(0x7f0000000100)='\xd4\xb4y\x05F%v\xd5\xb2\xe0P(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\x00\xad\xeb\x7ft\x92\xda\xce\x0f\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xf2\xd8f\xbe/\xcdn\xe6\x01\xa7\xfb\x16\xaa\x84\x05A\xa1B\xe1B\x12\xd6\xb7w\xd9\xc4`\x15\xf3\x90\x8e\xe5x\xfe\x93>\x1c\xb1\xde\xf7\xebY;b\xd0[\xed2\x1b\xd0\x80u', 0x0) fcntl$setlease(r0, 0xa, 0x0) [ 72.439319][ T5767] team0: Port device team_slave_0 added executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) writev(r0, &(0x7f00000008c0)=[{&(0x7f0000000680)='\'', 0x1}], 0x1) [ 72.480154][ T5767] team0: Port device team_slave_1 added executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, &(0x7f0000000080)) executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$FICLONERANGE(r1, 0x5450, 0x0) executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', 0x0, 0xfffffee6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8903, &(0x7f0000000000)={0x1, 'veth0_to_team\x00'}) pipe2(0x0, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) listen(r1, 0x2) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x8, &(0x7f0000000100), 0x4) executing program 0: r0 = epoll_create1(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x5450, 0x0) r1 = memfd_create(&(0x7f0000000300)='c\x9c\\\xd4\xa4-K\x98.U\xb4#\xe1)\x94:\x04\xff\x96\x13\xae\x83\x1d##\xe8A\x0fB\x13\xb7\xc9\xcc\x8c\xacn(sN\xe4\xfb?\xc5\xd0\"`\n\x98\xe7\xfc\xfb\x8fY\xa8\xc8\xa6\xe7\x97\xac3\'\x02m\xc1\xbfBR\xbe\xef\xb16\xe57\xb9\x13\xc4\x81j\x10\xaf\x95e|\x90\xf7\x99V\xfa\xc0&\xf2\xb8N\xb6\x01#\xe2\x8c`QV\x9eA\xe4\x88C\x81\xc5\x01P\xd1^=', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x5451, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x63, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x63, 0x0) fstat(0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000000200)) msgget$private(0x0, 0x0) r2 = mq_open(&(0x7f00000005c0)='trusted>overlay.up\xdder\x00', 0x40, 0x0, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000040)) [ 72.573380][ T5767] batman_adv: batadv0: Adding interface: batadv_slave_0 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x5411, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg$unix(r1, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/176, 0xb0}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/185, 0xb9}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000540)=""/45, 0x2d}, {&(0x7f0000000580)=""/143, 0x8f}, {&(0x7f0000000640)=""/83, 0x53}, {&(0x7f00000006c0)=""/53, 0x35}], 0x9, &(0x7f00000007c0)=[@cred={{0x1c}}], 0x20}}], 0x1, 0x100, &(0x7f0000000840)={0x0, 0x989680}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000000)) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000900), &(0x7f0000000980)=0x6e) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000009c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tcp_congestion(r3, 0x0, 0x0) [ 72.582893][ T5767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.614350][ T5767] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$int_out(r0, 0x800000005450, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8904, &(0x7f0000000080)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xdad]}, 0x8, 0x800) r3 = dup3(r1, r2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = dup(r5) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r6, 0x5450, 0x0) io_submit(0x0, 0x3, &(0x7f0000000780)=[0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x8000, r3, &(0x7f0000000200)="92dcc5dbc64a468d482c5ea65d8da85a549d9325844c842f4d9d4d52fe6fc7921d5d0d77bbbad163bb1c0e2dfba24a27905781bc4021ea83e90fb7d70a9716ec7cee48fe40ee88f2da5a81ffd1a6fff81600eae717809b34", 0x58, 0x6}, 0x0]) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r7, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) connect$inet(r4, &(0x7f00000007c0)={0x2, 0x2, @local}, 0x10) r8 = accept4$inet6(r7, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) listen(0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r8, 0x541b, &(0x7f00000000c0)) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$EXT4_IOC_GETFSUUID(r0, 0x5451, 0x0) [ 72.690654][ T5767] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.692742][ T5767] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) memfd_create(0x0, 0x0) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x5450, 0x0) executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000001400)=[{{&(0x7f0000000000)=@file={0x2, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) [ 72.728181][ T5767] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) r2 = dup(r1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x5452, &(0x7f0000000000)) [ 72.757188][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5451, 0x0) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$TCSETS(r0, 0x8902, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, "b50d8d65fa0aa1ee66febeb1314dd2071c128a"}) executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) r2 = dup3(r0, r1, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5450) [ 72.869705][ T5767] device hsr_slave_0 entered promiscuous mode executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0x5451, 0x0) [ 72.884128][ T5767] device hsr_slave_1 entered promiscuous mode executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000004200)='.log\x00', 0x101041, 0x0) write$cgroup_int(r0, 0x0, 0x0) executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close_range(r0, r0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$KDSKBMETA(r1, 0x8904, &(0x7f00000000c0)) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x5450, 0x0) executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002b40)) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x4140c, 0x0) mount$9p_xen(&(0x7f0000000640), &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x280030, 0x0) executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) dup3(r0, r1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) [ 73.213282][ T5891] EXT4-fs (nvme0n1p2): re-mounted. Quota mode: none. executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480)="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", 0x10af6109, 0xc000, 0x0, 0xfffffcef) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockname$netlink(r1, 0x0, &(0x7f0000000100)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffff"], 0x290) executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x5450, 0x0) executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001f00), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) [ 73.454769][ T4254] Bluetooth: hci0: command tx timeout executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x5450) executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xc0141, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) executing program 2: r0 = epoll_create1(0x0) ioctl$SIOCGSKNS(r0, 0x5451, 0x0) executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$FUSE_LK(r1, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) close(r3) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x40001, 0x0) dup3(r3, r1, 0x0) executing program 2: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000009) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 73.890539][ T218] device hsr_slave_0 left promiscuous mode executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000140)=0x10) [ 73.942049][ T218] device hsr_slave_1 left promiscuous mode executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x9) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x111bc3, 0x0) pipe2$watch_queue(0x0, 0x80) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00', 0x0, 0x0, 0x0, [0x3, 0x0, 0x411, 0x0, 0x1]}, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mq_open(0x0, 0x800, 0x82, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0x5450, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) listen(r3, 0x4005) r4 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) ioctl$BTRFS_IOC_SYNC(r4, 0x5450, 0x0) socket$inet(0x2, 0x0, 0x1) close(r4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000140)) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r1) fcntl$dupfd(r0, 0x0, r1) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5450, 0x0) [ 74.004619][ T218] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.006675][ T218] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.016013][ T218] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.033798][ T218] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.041863][ T218] device bridge_slave_1 left promiscuous mode [ 74.058159][ T218] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)='h', 0x1}], 0x1}}], 0x1, 0x0) [ 74.114203][ T218] device bridge_slave_0 left promiscuous mode [ 74.116089][ T218] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.134398][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc) r0 = memfd_create(&(0x7f0000000200)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x8000001) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x5421, &(0x7f0000000100)) executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_RSETATTR(r1, 0x0, 0x0) executing program 4: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$TUNSETCARRIER(r0, 0x5450, 0x0) executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x84cc0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5451, 0x0) [ 74.252422][ T218] device veth1_macvtap left promiscuous mode [ 74.254549][ T218] device veth0_macvtap left promiscuous mode [ 74.256600][ T218] device veth1_vlan left promiscuous mode [ 74.258363][ T218] device veth0_vlan left promiscuous mode executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x123840, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040), 0x2, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') ioctl$KDSETKEYCODE(r0, 0x5451, 0x0) executing program 2: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) write$P9_RREADDIR(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) dup3(r2, r1, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x5451, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) dup3(r1, r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$inet(r3, 0x0, 0x0, 0x0) executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002100)='stat\x00') write$FUSE_STATFS(r0, 0x0, 0x0) executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg$sock(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d9", 0x1}], 0x1}, 0x0) executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$EXT4_IOC_GETSTATE(r0, 0x5452, &(0x7f0000000080)) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 74.899004][ T218] team0 (unregistering): Port device team_slave_1 removed [ 74.919934][ T218] team0 (unregistering): Port device team_slave_0 removed executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003040)) [ 74.971649][ T218] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x10) r1 = gettid() close(r0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) socket$unix(0x1, 0x1, 0x0) tkill(r1, 0x1000000000016) [ 75.042917][ T218] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface executing program 4: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000001440), 0x2, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "66c01086db98d7a2", "f0c1945925c097b5157fe95acd8d6c60", "7d069a2c", "bc2bfcba0fb78e8d"}, 0x28) executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) getpeername$inet6(r3, 0x0, &(0x7f00000000c0)) executing program 4: lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept$inet6(r1, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000200)={{0x5e, @multicast1, 0x4e20, 0x1, 'wrr\x00', 0x23, 0x0, 0x40058}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0xfffff001}}, 0x44) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x5450, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x5450, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), 0x0) sync_file_range(r4, 0x80000001, 0xffff, 0x7) fcntl$dupfd(r1, 0x0, r1) r5 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x103041, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x5450, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000180), 0x4) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000001540)={0x4118130, {{0x2, 0x4e20, @broadcast}}, 0x1, 0x6, [{{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x0, @broadcast}}, {{0x2, 0x4e21, @broadcast}}]}, 0x390) sendto$inet(r3, &(0x7f0000000540)="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", 0xfa8, 0x80, 0x0, 0x0) executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$FIONCLEX(r0, 0x5450) executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) [ 75.328644][ T218] bond0 (unregistering): Released all slaves executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) fstatfs(r1, &(0x7f0000000000)=""/62) executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$FUSE_POLL(r1, 0x0, 0x0) [ 75.497290][ T5767] netdevsim netdevsim3 netdevsim0: renamed from eth0 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) [ 75.534542][ T4260] Bluetooth: hci0: command tx timeout executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @empty}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000200)={0x0, @multicast2, 0x0, 0x0, 'none\x00', 0x0, 0x89a, 0x2e}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @loopback}, &(0x7f0000000100)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) write$P9_RREADDIR(r3, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x2, 0x1f) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x410, 0x0, 0xe8, 0x1f8, 0x328, 0x328, 0x328, 0x4, &(0x7f0000000000), {[{{@arp={@empty, @empty, 0xff, 0xffffffff, 0x3, 0x0, {@empty, {[0x0, 0xff, 0xff, 0x0, 0x7f]}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'gretap0\x00', 'netpci0\x00'}, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@multicast, @local, @multicast2, 0x2, 0xffffffff}}}, {{@arp={@multicast2, @loopback, 0xffffff00, 0xff000000, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 'bond0\x00', 'wg2\x00', {}, {}, 0x0, 0x2}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x4, 0x8, 0x3, 0x0, 0x0, "1246b1b193e362cf09829d2bec1604fd63c82931250684cc2adbcb69ef78212a971ba918bf7a9aa890b86934f5875e90e37d56c0eb46bf757f40b044cb4dc155"}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x460) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x78) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) syncfs(0xffffffffffffffff) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x5421, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) [ 75.542135][ T5767] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 75.575709][ T5767] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 75.602990][ T5767] netdevsim netdevsim3 netdevsim3: renamed from eth3 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8c21c2, 0x0) write$cgroup_devices(r0, 0x0, 0x0) executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x8) [ 75.647805][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 75.654679][ T6005] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 75.659343][ T6005] x_tables: duplicate underflow at hook 1 executing program 2: r0 = socket(0x10, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x5452, &(0x7f0000000000)) [ 75.741195][ T5767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.756743][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.760071][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.769982][ T5767] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.775670][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.778430][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.781083][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.783058][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.800357][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.803115][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000031c0)={0xffffffffffffffff}) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) dup3(r0, r1, 0x0) setsockopt$sock_void(r1, 0x1, 0x0, 0x0, 0x0) [ 75.807438][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.810009][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.811959][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.828086][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x541b, &(0x7f0000000540)={{0x2, 0x0, @multicast1}, {0x0, @random}, 0x0, {0x2, 0x0, @broadcast}, 'virt_wifi0\x00'}) [ 75.844656][ T5767] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 75.849548][ T5767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.854215][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.857476][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.860472][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.863512][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.867154][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.869966][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.872614][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.875879][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.878496][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.887902][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 75.909480][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r3, 0x5450, 0x0) executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCBRADDBR(r0, 0x5451, 0x0) executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x5450, 0x0) executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xc) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x5452, &(0x7f0000000040)) [ 76.121083][ T5767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.124546][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.127109][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.155456][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 76.158880][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$packet(r0, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$TIOCCBRK(r0, 0x5450) executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) [ 76.233357][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.237689][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.240831][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.245178][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.250556][ T5767] device veth0_vlan entered promiscuous mode [ 76.260251][ T5767] device veth1_vlan entered promiscuous mode executing program 1: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) close_range(r0, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) [ 76.322444][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 76.326626][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 76.330193][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready executing program 4: pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) [ 76.338377][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.343297][ T5767] device veth0_macvtap entered promiscuous mode executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, 0x0, 0x0) [ 76.417901][ T5767] device veth1_macvtap entered promiscuous mode [ 76.448202][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 76.453486][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.475786][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 1: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x5452, 0x0) [ 76.492608][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.504267][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 76.507562][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.510143][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 76.512969][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000002280)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x5451, 0x0) executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x5452, &(0x7f0000000180)) [ 76.549747][ T5767] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.555602][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 76.558509][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.561155][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 76.572466][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.577950][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 76.581472][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 76.587808][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 76.591424][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0xb, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 76.600765][ T5767] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 76.607587][ T5767] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.611026][ T5767] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.614193][ T5767] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.617661][ T5767] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.621442][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 76.629529][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 76.632120][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.635102][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.637865][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.640625][ T4284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x5450, 0x0) [ 76.775261][ T437] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.777593][ T437] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="2bcdf9ae0929ca17", 0x8, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000400)) [ 76.781005][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000002180)='./binderfs/custom0\x00', 0xeb25b93d5c02de52, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8903, &(0x7f0000000080)={'team_slave_0\x00'}) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r1) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) [ 76.837728][ T437] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.840861][ T437] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.845927][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000015c0), 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x5450, 0x0) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x8912, &(0x7f00000000c0)={'tunl0\x00'}) listen(r1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) r3 = accept$inet6(r1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x1e) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000008580)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000040)=0x59) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x5450, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = accept4$inet6(r0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x5451, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r2) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_open_pts(r5, 0x41e381) accept$inet6(r5, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) dup3(r3, r4, 0x0) getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x19, 0x0, &(0x7f0000000000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000002c0)={r2}) socket$packet(0x11, 0x0, 0x300) getpeername(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x541b, &(0x7f00000001c0)={'syztnl0\x00', 0x0}) executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0x541b, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$TUNSETCARRIER(r2, 0x5451, 0x0) executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) r5 = dup3(r4, r3, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x2, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) [ 77.129106][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80800) [ 77.171793][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. executing program 0: r0 = timerfd_create(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RLERRORu(r0, 0x0, 0x0) executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x5450, 0x0) executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000001680)={0xa, 0x0, 0x0, @mcast2}, 0x1c) executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x0, 0xea60}, 0x10) r1 = dup(r0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) write$FUSE_NOTIFY_POLL(r1, 0x0, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x60) writev(r1, 0x0, 0x0) executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x0, @dev}}) executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x5421, &(0x7f0000000040)) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x1001000, 0x0) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x80000, &(0x7f0000000180)) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5451, 0x0) [ 77.616637][ T4254] Bluetooth: hci0: command tx timeout executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x34d481, 0x44) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80) ioctl$FS_IOC_RESVSP(r1, 0x5452, &(0x7f0000000100)) executing program 3: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x5451, 0x0) executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x30) executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f00000000c0)={@private1}, &(0x7f0000000100)=0x14) executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20200009) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$FS_IOC_GETVERSION(r2, 0x5452, &(0x7f0000000040)) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x20040841, 0x0, 0xfffffffffffffe37) executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5450, 0x0) executing program 0: r0 = memfd_create(&(0x7f0000000140)='\x00\xb40\x87\xcd\xcd#c\t!\".\x89\xb1\xf2(\x96\x00D\xdb4\xaa\x9dk\xac\xb1\xd6vP7]DM*\xb5\x05\xd7\x13\x1e\xe3\\\v\xa7\x14\x00n\'\xcb\xae\xfdR\x12\xb1', 0x0) write(r0, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) ioctl$FICLONE(r1, 0x5451, 0xffffffffffffffff) executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000004c0), &(0x7f0000000500)=0x4) executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$addseals(r0, 0x406, 0xef769b275117f722) executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet6_SIOCDELRT(r0, 0x541b, &(0x7f00000000c0)={@local, @empty, @dev}) executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0xffffffffffffffff, 0x0) executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x6c0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup(r1) r3 = accept$inet(r2, 0x0, 0x0) listen(r3, 0x0) executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$NS_GET_PARENT(r0, 0x541b, 0x20000000) executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) executing program 2: r0 = socket$inet6(0xa, 0x80801, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = dup(r0) shutdown(r1, 0x0) write$cgroup_pressure(r1, 0x0, 0x0) executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x8903, &(0x7f0000000080)) [ 78.430207][ T4249] [ 78.430979][ T4249] ====================================================== [ 78.432975][ T4249] WARNING: possible circular locking dependency detected [ 78.434924][ T4249] 6.1.91-syzkaller #0 Not tainted [ 78.436278][ T4249] ------------------------------------------------------ [ 78.438222][ T4249] syz-executor.0/4249 is trying to acquire lock: [ 78.439903][ T4249] ffff0000d7f3e3f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: __jbd2_log_wait_for_space+0x1a4/0x5cc [ 78.442834][ T4249] [ 78.442834][ T4249] but task is already holding lock: [ 78.444969][ T4249] ffff0000f1f22218 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xd8/0x508 [ 78.447709][ T4249] [ 78.447709][ T4249] which lock already depends on the new lock. [ 78.447709][ T4249] [ 78.450502][ T4249] [ 78.450502][ T4249] the existing dependency chain (in reverse order) is: [ 78.453074][ T4249] [ 78.453074][ T4249] -> #1 (&sb->s_type->i_mutex_key#9){++++}-{3:3}: [ 78.455432][ T4249] down_read+0x64/0x308 [ 78.456880][ T4249] ext4_bmap+0x58/0x35c [ 78.458179][ T4249] bmap+0xa8/0xe8 [ 78.459287][ T4249] jbd2_journal_flush+0x4bc/0xa5c [ 78.460788][ T4249] ext4_ioctl+0x3834/0x6afc [ 78.462196][ T4249] __arm64_sys_ioctl+0x14c/0x1c8 [ 78.463639][ T4249] invoke_syscall+0x98/0x2c0 [ 78.465071][ T4249] el0_svc_common+0x138/0x258 [ 78.466482][ T4249] do_el0_svc+0x64/0x218 [ 78.467731][ T4249] el0_svc+0x58/0x168 [ 78.468909][ T4249] el0t_64_sync_handler+0x84/0xf0 [ 78.470358][ T4249] el0t_64_sync+0x18c/0x190 [ 78.471697][ T4249] [ 78.471697][ T4249] -> #0 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 78.474063][ T4249] __lock_acquire+0x3338/0x7680 [ 78.475558][ T4249] lock_acquire+0x26c/0x7cc [ 78.476888][ T4249] __mutex_lock_common+0x190/0x21a0 [ 78.478394][ T4249] mutex_lock_io_nested+0x6c/0x88 [ 78.479806][ T4249] __jbd2_log_wait_for_space+0x1a4/0x5cc [ 78.481402][ T4249] add_transaction_credits+0x7dc/0xafc [ 78.482993][ T4249] start_this_handle+0x5c4/0x13ac [ 78.484392][ T4249] jbd2__journal_start+0x298/0x544 [ 78.485937][ T4249] __ext4_journal_start_sb+0x304/0x6f4 [ 78.487560][ T4249] __ext4_unlink+0x360/0x988 [ 78.488853][ T4249] ext4_unlink+0x1d8/0x7d0 [ 78.490202][ T4249] vfs_unlink+0x2f0/0x508 [ 78.491537][ T4249] do_unlinkat+0x4cc/0x70c [ 78.492880][ T4249] __arm64_sys_unlinkat+0xcc/0xfc [ 78.494343][ T4249] invoke_syscall+0x98/0x2c0 [ 78.495681][ T4249] el0_svc_common+0x138/0x258 [ 78.497068][ T4249] do_el0_svc+0x64/0x218 [ 78.498320][ T4249] el0_svc+0x58/0x168 [ 78.499526][ T4249] el0t_64_sync_handler+0x84/0xf0 [ 78.501002][ T4249] el0t_64_sync+0x18c/0x190 [ 78.502395][ T4249] [ 78.502395][ T4249] other info that might help us debug this: [ 78.502395][ T4249] [ 78.505034][ T4249] Possible unsafe locking scenario: [ 78.505034][ T4249] [ 78.507060][ T4249] CPU0 CPU1 [ 78.508555][ T4249] ---- ---- [ 78.510000][ T4249] lock(&sb->s_type->i_mutex_key#9); [ 78.511468][ T4249] lock(&journal->j_checkpoint_mutex); [ 78.513722][ T4249] lock(&sb->s_type->i_mutex_key#9); [ 78.516007][ T4249] lock(&journal->j_checkpoint_mutex); [ 78.517543][ T4249] [ 78.517543][ T4249] *** DEADLOCK *** [ 78.517543][ T4249] [ 78.519685][ T4249] 3 locks held by syz-executor.0/4249: [ 78.521170][ T4249] #0: ffff0000d7f38460 (sb_writers#3){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 78.523678][ T4249] #1: ffff0000e0384a38 (&type->i_mutex_dir_key#3/1){+.+.}-{3:3}, at: do_unlinkat+0x2d0/0x70c [ 78.526423][ T4249] #2: ffff0000f1f22218 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xd8/0x508 [ 78.529116][ T4249] [ 78.529116][ T4249] stack backtrace: [ 78.530734][ T4249] CPU: 1 PID: 4249 Comm: syz-executor.0 Not tainted 6.1.91-syzkaller #0 [ 78.533000][ T4249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 78.535709][ T4249] Call trace: [ 78.536584][ T4249] dump_backtrace+0x1c8/0x1f4 [ 78.537807][ T4249] show_stack+0x2c/0x3c [ 78.538964][ T4249] dump_stack_lvl+0x108/0x170 [ 78.540243][ T4249] dump_stack+0x1c/0x58 [ 78.541420][ T4249] print_circular_bug+0x150/0x1b8 [ 78.542770][ T4249] check_noncircular+0x2cc/0x378 [ 78.544135][ T4249] __lock_acquire+0x3338/0x7680 [ 78.545465][ T4249] lock_acquire+0x26c/0x7cc [ 78.546680][ T4249] __mutex_lock_common+0x190/0x21a0 [ 78.548049][ T4249] mutex_lock_io_nested+0x6c/0x88 [ 78.549557][ T4249] __jbd2_log_wait_for_space+0x1a4/0x5cc [ 78.551060][ T4249] add_transaction_credits+0x7dc/0xafc [ 78.552569][ T4249] start_this_handle+0x5c4/0x13ac [ 78.553986][ T4249] jbd2__journal_start+0x298/0x544 [ 78.555505][ T4249] __ext4_journal_start_sb+0x304/0x6f4 [ 78.556996][ T4249] __ext4_unlink+0x360/0x988 [ 78.558276][ T4249] ext4_unlink+0x1d8/0x7d0 [ 78.559477][ T4249] vfs_unlink+0x2f0/0x508 [ 78.560527][ T4249] do_unlinkat+0x4cc/0x70c [ 78.561752][ T4249] __arm64_sys_unlinkat+0xcc/0xfc [ 78.563105][ T4249] invoke_syscall+0x98/0x2c0 [ 78.564359][ T4249] el0_svc_common+0x138/0x258 [ 78.565651][ T4249] do_el0_svc+0x64/0x218 [ 78.566710][ T4249] el0_svc+0x58/0x168 [ 78.567808][ T4249] el0t_64_sync_handler+0x84/0xf0 [ 78.569153][ T4249] el0t_64_sync+0x18c/0x190 [ 79.693699][ T4260] Bluetooth: hci0: command tx timeout